Login / Signup

An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme.

Masoomeh SepehriAlberto TrombettaMaryam SepehriErnesto Damiani
Published in: ARES (2018)
Keyphrases
  • cellular automata
  • database
  • multimedia
  • databases
  • real world
  • image processing
  • expert systems
  • information technology
  • artificial neural networks
  • special case