Login / Signup

A novel proxy signature scheme based on user hierarchical access control policy.

Ashok Kumar DasAshish MassandSagar Patil
Published in: J. King Saud Univ. Comput. Inf. Sci. (2013)
Keyphrases
  • proxy signature scheme
  • access control
  • access control policies
  • security analysis