• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.

David NuñezIsaac AgudoJavier López
Published in: J. Netw. Comput. Appl. (2017)
Keyphrases
  • access control
  • relational databases
  • software architecture
  • intrusion detection system