Login / Signup
Exploiting Caching, Proxy Re-encryption, Incentives, and Wi-Fi Direct for Authorized Content Distribution.
Nikos Fotiou
George C. Polyzos
Published in:
EUSPN/ICTH (2016)
Keyphrases
</>
wifi
proxy re encryption
mobile devices
wireless networks
wireless communication
multimedia
location information
standard model
end to end
query processing
smart phones
database
data access
security model
encryption scheme
keyword search
network structure
data distribution
real time