Login / Signup
A Reliable User Authentication and Data Protection Model in Cloud Computing Environments.
Mohammad Ahmadi
Mostafa Vali
Farez Moghaddam
Aida Hakemi
Kasra Madadipouya
Published in:
CoRR (2015)
Keyphrases
</>
computing environments
data mining
wireless sensor networks
data points