Login / Signup
Analysis of attribute-based cryptographic techniques and their application to protect cloud services.
Sana Belguith
Nesrine Kaaniche
Mohammad Hammoudeh
Published in:
Trans. Emerg. Telecommun. Technol. (2022)
Keyphrases
</>
computing resources
user preferences