Login / Signup
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme.
Masoomeh Sepehri
Alberto Trombetta
Maryam Sepehri
Ernesto Damiani
Published in:
ARES (2018)
Keyphrases
</>
cellular automata
database
multimedia
databases
real world
image processing
expert systems
information technology
artificial neural networks
special case