3   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Anant Sujatanagarjuna, Arne Bochem and Benjamin Leiding    
Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or incomplete specifications, in general, pose risks to the direct users of a protocol and further stakeholders. Formal methods, such as Colored Petri Nets (CPNs), facilita... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei    
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei    
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »