C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
David Nuñez
Isaac Agudo
Javier López
Published in:
J. Netw. Comput. Appl. (2017)
Keyphrases
</>
access control
relational databases
software architecture
intrusion detection system