Login / Signup
A novel proxy signature scheme based on user hierarchical access control policy.
Ashok Kumar Das
Ashish Massand
Sagar Patil
Published in:
J. King Saud Univ. Comput. Inf. Sci. (2013)
Keyphrases
</>
proxy signature scheme
access control
access control policies
security analysis