Sign in

End-to-end policy based encryption techniques for multi-party data management.

Michael BeiterMarco Casassa MontLiqun ChenSiani Pearson
Published in: Comput. Stand. Interfaces (2014)
Keyphrases