Sign in

How to achieve non-repudiation of origin with privacy protection in cloud computing.

Wei WuJianying ZhouYang XiangLi Xu
Published in: J. Comput. Syst. Sci. (2013)
Keyphrases