Fingerprint
Dive into the research topics of 'The need, use and efficiency of trustworthy security model in Cloud computing for information assurance'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Kishore Bhamidipati*, S. Karanth Shyam
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution