Fingerprint
Dive into the research topics of 'How to use attribute-based encryption to implement role-based access control in the cloud'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Yan Zhu, Di Ma, Chang Jun Hu, Dijiang Huang
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution