Login / Signup

Design, implementation, and performance evaluation of identity-based cryptography in ONOS.

Jun Huy LamSanggon LeeHoon-Jae LeeYustus Eko Oktian
Published in: Int. J. Netw. Manag. (2018)
Keyphrases
  • design process
  • database
  • resource constraints
  • identity based cryptography