Cryptographic implementation of a tree hierarchy for access control

Abstract
No abstract available

This publication has 6 references indexed in Scilit: