Login / Signup
Algorithms and Approaches of Proxy Signature: A Survey.
Manik Lal Das
Ashutosh Saxena
Deepak B. Phatak
Published in:
Int. J. Netw. Secur. (2009)
Keyphrases
</>
information systems
database systems
data mining techniques