Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

"Cryptographic role-based security mechanisms based on role-key hierarchy."

Yan Zhu et al. (2010)

Details and statistics

DOI: 10.1145/1755688.1755728

access: closed

type: Conference or Workshop Paper

metadata version: 2023-06-26