Login / Signup
On the use of proxy re-encryption to control access to sensitive data on information centric networking.
Roan Simoes da Silva
Sérgio Donizetti Zorzo
Published in:
ICOIN (2016)
Keyphrases
</>
sensitive data
sensitive information
management system
information extraction
feature space
relational databases
distributed systems
data sharing