Sign in

A secure data storage based on revocation game-theoretic approaches in cloud computing environments.

Maha JebaliaAsma Ben LetaifaMohamed HamdiSami Tabbane
Published in: IWCMC (2017)
Keyphrases