Sign in

Secure provenance using an authenticated data structure approach.

Fuzel JamilAbid KhanAdeel AnjumMansoor AhmedFarhana JabeenNadeem Javaid
Published in: Comput. Secur. (2018)
Keyphrases