Login / Signup

Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption.

Naîma MeddahAhmed Toumanari
Published in: Int. J. Cloud Comput. (2016)
Keyphrases