2019
DOI: 10.1007/s11227-019-02920-8
|View full text |Cite
|
Sign up to set email alerts
|

An efficient stream structure for broadcasting the encrypted XML data in mobile wireless broadcast channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…In 2008, domestic scholars compared the basis of the three industrial structures in Jiangsu, Zhejiang, and Shanghai. They analyzed the precise positioning of the industrial structure adjustment in Zhejiang Province and proposed a rational industrial structure path that conforms to the industrial layout of Zhejiang Province [ 25 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2008, domestic scholars compared the basis of the three industrial structures in Jiangsu, Zhejiang, and Shanghai. They analyzed the precise positioning of the industrial structure adjustment in Zhejiang Province and proposed a rational industrial structure path that conforms to the industrial layout of Zhejiang Province [ 25 ].…”
Section: Introductionmentioning
confidence: 99%
“…ey analyzed the precise positioning of the industrial structure adjustment in Zhejiang Province and proposed a rational industrial structure path that conforms to the industrial layout of Zhejiang Province [25].…”
Section: Introductionmentioning
confidence: 99%
“…All kinds of data storage systems in shared environments have shown great potential and provide great convenience to people [10,11]. At present, storage platforms can be violated by various malicious attacks.…”
Section: Discussionmentioning
confidence: 99%
“…From DTD or XML schema, we can know about the framework of XML documents. At present, many authorization schemes are based on DTD or XML schema [8][9][10][11]; in these schemes, authorization is reflected in DTD or XML schema, so the search of authorization nodes is easy and fast. In addition, the storage of DTD and XML schema is lightweight, which reduces the burden on the server.…”
Section: Structure-basedmentioning
confidence: 99%