A Searchable Re-encryption Storage Method in Cloud Environment
Hui, Wang, Bo, Hong, Junyong, Tang
Simulation of Self-similarFlowBased on Fractal Gaussian Noise Method
Jie, Li, Ying, Lu, Junyong, Tang
A Mobile Terminal Security Strategy Based On the Cloud Storage
Hui, Wang, Junyong, Tang