Login / Signup
A P2P based usage control enforcement scheme resilient to re-injection attacks.
Iraklis Leontiadis
Refik Molva
Melek Önen
Published in:
WoWMoM (2014)
Keyphrases
</>
usage control
access control
injection attacks
peer to peer
information systems
social networks
distributed systems
data sharing