Login / Signup
Design, implementation, and performance evaluation of identity-based cryptography in ONOS.
Jun Huy Lam
Sanggon Lee
Hoon-Jae Lee
Yustus Eko Oktian
Published in:
Int. J. Netw. Manag. (2018)
Keyphrases
</>
design process
database
resource constraints
identity based cryptography