You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center | |
Zhang, Leo Yu[1]; Zheng, Yifeng[2]; Weng, Jian[3]; Wang, Cong[4]; Shan, Zihao[5]; Ren, Kui[6] | |
2018 | |
URL标识 | 查看原文 |
内容类型 | 期刊论文 |
URI标识 | http://www.corc.org.cn/handle/1471x/4755975 |
专题 | 暨南大学 |
作者单位 | 1.[1] Department of Electronic Engineering, City University of Hong Kong, Kowloon, Kowloon Hong Kong [e-mail: leocityu@gmail.com] 2.[2] Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong [e-mail: yifeng.zheng@my.cityu.edu.hk] 3.[3] Department of Computer Science, Jinan University, Tianhe, GuangZhou China 510632 [e-mail: cryptjweng@gmail.com] 4.[4] Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong [e-mail: congwang@cityu.edu.hk] 5.[5] Computer Science and Engineering, University at Buffalo - The State University of New York, 12292 Buffalo, New York United States 14228 [e-mail: zihaosha@buffalo.edu] 6.[6] CSE, SUNY at Buffalo, Buffalo, New York United States 14260 [e-mail: kuiren@buffalo.edu] |
推荐引用方式 GB/T 7714 | Zhang, Leo Yu[1],Zheng, Yifeng[2],Weng, Jian[3],et al. You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center[J],2018. |
APA | Zhang, Leo Yu[1],Zheng, Yifeng[2],Weng, Jian[3],Wang, Cong[4],Shan, Zihao[5],&Ren, Kui[6].(2018).You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center.. |
MLA | Zhang, Leo Yu[1],et al."You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center".(2018). |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论