Secure data outsourcing scheme in cloud computing with attribute-based encryption

S Zhu, Y Han - International Journal of High Performance …, 2018 - inderscienceonline.com
Cloud computing is clearly becoming one of the dominating infrastructures for enterprises as
long as they are end users. But in the view of cloud users, such as traditional big companies …

Relay protection hidden fault monitoring and risk analysis based on the power system

LY Ning - Proceedings of the International Conference on …, 2020 - Springer
With the continuous expansion of the grid, the safe operation of the power grid is also
becoming more and more important than before. Relay protection is one of the important …

[引用][C] INTEGRIRAN MONITORING KOT ORODJE ZA UČINKOVITO IN EKONOMIČNO ENERGETSKO UPRAVLJANJE JAVNIH STAVB

P Praper - 2016 - Univerza v Mariboru, Fakulteta za …