Login / Signup

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.

David NuñezIsaac AgudoJavier López
Published in: J. Netw. Comput. Appl. (2017)
Keyphrases
  • access control
  • relational databases
  • software architecture
  • intrusion detection system