4 results on '"Wang, Yichuan"'
Search Results
2. Efficient group authentication in RFID using secret sharing scheme.
3. A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing
4. From high-availability to collapse: quantitative analysis of “Cloud-Droplet-Freezing” attack threats to virtual machine migration in cloud computing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.