KK Mar, ZQ Hu, CY Law, M Wang - 2016 11th International …, 2016 - ieeexplore.ieee.org
Traditional methods of securing data are challenged by specific nature and architecture of
cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis …