Influence of Management and Sharing Protocols for Decision Making Processes in Cloud Computing
暂无分享,去创建一个
[1] Urszula Ogiela,et al. Classification of Cognitive Service Management Systems in Cloud Computing , 2017, BWCCA.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Lidia Ogiela,et al. Intelligent techniques for secure financial management in cloud computing , 2015, Electron. Commer. Res. Appl..
[4] Marek R. Ogiela,et al. Insider Threats and Cryptographic Techniques in Secure Information Management , 2017, IEEE Systems Journal.
[5] Lidia Ogiela. Advanced techniques for knowledge management and access to strategic information , 2015, Int. J. Inf. Manag..
[6] Lidia Ogiela,et al. Cryptographic techniques of strategic data splitting and secure information management , 2016, Pervasive Mob. Comput..
[7] Marek R. Ogiela,et al. Bio-Inspired Cryptographic Techniques in Information Management Applications , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[8] Amos Beimel,et al. Secret-Sharing Schemes for Very Dense Graphs , 2014, Journal of Cryptology.
[9] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[10] Marek R. Ogiela,et al. Secure Information Management in Hierarchical Structures , 2011 .
[11] Marek R. Ogiela,et al. Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[12] Stephen Grossberg,et al. Adaptive Resonance Theory: How a brain learns to consciously attend, learn, and recognize a changing world , 2013, Neural Networks.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.