Return to Article Details
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment.
Download
Download PDF