Citation to this article as recorded by
Raj, P., C. Nithya, A. Parvathy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Elucidating the robust and resilient cloud security solution approaches. Res. J. Inform. Technol., 5: 442-448. CrossRefDirect Link |
Rezai, A. and P. Keshavarzi, 2012. A New cmm-naf modular exponentiation algorithm by using a new modular multiplication algorithm. Trends Applied Sci Res., 7: 240-247. CrossRefDirect Link |
Citation to this article as recorded by
An Efficient Framework for Cloud Infrastructure Security 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS) |
A New CMM-NAF Modular Exponentiation Algorithm by using a New Modular Multiplication Algorithm Trends in Applied Sciences Research Vol. 7, Issue 3, 240, 2012 |
How to cite this article
Yingjie Xia, Li Kuang and Mingzhe Zhu, 2010. A Hierarchical Access Control Scheme in Cloud using HHECC. Information Technology Journal, 9: 1598-1606.
DOI: 10.3923/itj.2010.1598.1606
URL: https://scialert.net/abstract/?doi=itj.2010.1598.1606
DOI: 10.3923/itj.2010.1598.1606
URL: https://scialert.net/abstract/?doi=itj.2010.1598.1606