Login / Signup
Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation Schemes.
Yuji Suga
Published in:
NBiS (2012)
Keyphrases
</>
access control
role based access control
wireless sensor networks
databases
data streams
management system
low cost