2015
DOI: 10.1016/j.elerap.2015.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent techniques for secure financial management in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 43 publications
(29 citation statements)
references
References 17 publications
0
29
0
Order By: Relevance
“…Although many experts have been trying to apply the ECG to security systems, they met the limitations following. [7][8][9] • According to the users' dynamic state, it finds different measured values. Then, the system does not accept two values.…”
Section: Limitationsmentioning
confidence: 99%
“…Although many experts have been trying to apply the ECG to security systems, they met the limitations following. [7][8][9] • According to the users' dynamic state, it finds different measured values. Then, the system does not accept two values.…”
Section: Limitationsmentioning
confidence: 99%
“…[13][14][15][16][17] In this chapter, the authors focus on discussing the topic of linguistic schemes for message sharing. The essence of the subject of the semantic analysis of data has been described inter alia in the publications.…”
Section: Linguistic Secret-sharing Schemesmentioning
confidence: 99%
“…Another class of data sharing schemes are biometric threshold schemes, as proposed in previous works . These algorithms, similarly to the linguistic threshold schemes, have been developed as an extension of classic data concealment schemes.…”
Section: Introductionmentioning
confidence: 99%