

Publisher: John Wiley & Sons Inc
E-ISSN: 1939-0122|8|12|2061-2069
ISSN: 1939-0114
Source: SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol.8, Iss.12, 2015-08, pp. : 2061-2069
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Privacy‐preserving authorization method for mashups
SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol. 8, Iss. 18, 2015-12 ,pp. :