Login / Signup
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system.
Kui Ma
Guoji Song
Yanwei Zhou
Ran Xu
Bo Yang
Published in:
Comput. Stand. Interfaces (2024)
Keyphrases
</>
identity authentication
access control
data protection
mobile commerce
database
databases
security model
key distribution
relational databases
database management systems
network security
security policies
data security