Publication | Closed Access
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud
51
Citations
10
References
2015
Year
Mobile SecurityEngineeringEdge ComputingInformation SecurityCloud ComputingData PrivacyCloud CryptographyCloud Computing SecurityMobile ComputingMobile Access EasyEnd-to-end EncryptionMobile Cloud ServiceData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1