How to achieve non-repudiation of origin with privacy protection in cloud computing (Q394727): Difference between revisions
From MaRDI portal
Created a new Item |
Changed an Item |
||
Property / author | |||
Property / author: Li Xu / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 68M11 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A62 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 6250816 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
security | |||
Property / zbMATH Keywords: security / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
non-repudiation | |||
Property / zbMATH Keywords: non-repudiation / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
privacy | |||
Property / zbMATH Keywords: privacy / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
protocol | |||
Property / zbMATH Keywords: protocol / rank | |||
Normal rank |
Revision as of 15:59, 29 June 2023
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | How to achieve non-repudiation of origin with privacy protection in cloud computing |
scientific article |
Statements
How to achieve non-repudiation of origin with privacy protection in cloud computing (English)
0 references
27 January 2014
0 references
security
0 references
non-repudiation
0 references
privacy
0 references
protocol
0 references