A security proxy scheme based on attribute node mapping for cloud storage

Huakang Li, Zhenyu Wang, Yitao Yang, Guozi Sun*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Fingerprint

Dive into the research topics of 'A security proxy scheme based on attribute node mapping for cloud storage'. Together they form a unique fingerprint.