1. Constrained cloud security: contact control approach
Authors : S.gowtham, P.saravanan, S.vignesh
Pages : 577-582
Citing this Journal Article :
S.gowtham, P.saravanan, S.vignesh, "Constrained cloud security: contact control approach ", Special Issue - SACAIM - November 2016, 577-582
Click here to Submit Copyright Takedown Notice for this article.