Login / Signup

Access control using threshold cryptography for ubiquitous computing environments.

Jalal Al-MuhtadiRaquel L. HillSumayah Al-Rwais
Published in: J. King Saud Univ. Comput. Inf. Sci. (2011)
Keyphrases