In virtualized and dynamical cloud computing environment, all resources such as infrastructure, hardware,platform, software and data can be virtualized and
Till now, the types of attacks for cryptographic device are usually distinguished as leakage and tampering attacks respectively.The former, also known as si
The MSP problem and its relevant polynomial-time heuristic algorithm (Z-H algorithm) proposed in [1] provided a promising solution to a series of NP problem
Published information provides us with the convenience of data analyses and knowledge acquisitions.However it also brings the publishers into the risk of di