Login / Signup
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
David Nuñez
Isaac Agudo
Javier López
Published in:
J. Netw. Comput. Appl. (2017)
Keyphrases
</>
access control
relational databases
software architecture
intrusion detection system