Login / Signup

On the use of proxy re-encryption to control access to sensitive data on information centric networking.

Roan Simoes da SilvaSérgio Donizetti Zorzo
Published in: ICOIN (2016)
Keyphrases
  • sensitive data
  • sensitive information
  • management system
  • information extraction
  • feature space
  • relational databases
  • distributed systems
  • data sharing