Your selections:
Enabling cloud storage auditing with key-exposure resistance
- Yu, Jia, Ren, Kui, Wang, Cong, Varadharajan, Vijay
Achieving secure role-based access control on encrypted data in cloud storage
- Zhou, Lan, Varadharajan, Vijay, Hitchens, Michael
Are you sure you would like to clear your session, including search history and login status?