How to achieve non-repudiation of origin with privacy protection in cloud computing

Wu, Wei, Zhou, Jianying, Xiang, Yang and Xu, Li 2013, How to achieve non-repudiation of origin with privacy protection in cloud computing, Journal of computer and system sciences, vol. 79, no. 8, pp. 1200-1213.

Attached Files
Name Description MIMEType Size Downloads

Title How to achieve non-repudiation of origin with privacy protection in cloud computing
Author(s) Wu, Wei
Zhou, Jianying
Xiang, Yang
Xu, Li
Journal name Journal of computer and system sciences
Volume number 79
Issue number 8
Start page 1200
End page 1213
Total pages 14
Publisher Elsevier
Place of publication Amsterdam, The Netherlands
Publication date 2013-12
ISSN 1090-2724
0022-0000
Keyword(s) non-repudiation
privacy
protocol
security
Language eng
Field of Research 080503 Networking and Communications
080501 Distributed and Grid Systems
080199 Artificial Intelligence and Image Processing not elsewhere classified
Socio Economic Objective 890301 Electronic Information Storage and Retrieval Services
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2013, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30057594

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 42 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Tue, 12 Nov 2013, 13:45:21 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.