Fingerprint
Dive into the research topics of 'A security proxy scheme based on attribute node mapping for cloud storage'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Huakang Li, Zhenyu Wang, Yitao Yang, Guozi Sun*
Research output: Chapter in Book or Report/Conference proceeding › Conference Proceeding › peer-review