Login / Signup

Secure sharing between untrusted users in a transparent source/binary deployment model.

Eelco Dolstra
Published in: ASE (2005)
Keyphrases