Login / Signup

Exploiting Caching, Proxy Re-encryption, Incentives, and Wi-Fi Direct for Authorized Content Distribution.

Nikos FotiouGeorge C. Polyzos
Published in: EUSPN/ICTH (2016)
Keyphrases