Login / Signup

Analysis of attribute-based cryptographic techniques and their application to protect cloud services.

Sana BelguithNesrine KaanicheMohammad Hammoudeh
Published in: Trans. Emerg. Telecommun. Technol. (2022)
Keyphrases
  • computing resources
  • user preferences