Figure1

Towards a cryptography encyclopedia: a survey on attribute-based encryption

Figure 1. Example representation of an access policy as a tree, according to Priya et al. [13].

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/