Further Study on Proxy Authorization and Its Scheme.
X. Zhou, Y. Su, and P. Wei. Complex (2), volume 5 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1701-1718. Springer, (2009)
Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/complex/ZhouSW09
%A Zhou, Xuanwu
%A Su, Yang
%A Wei, Ping
%B Complex (2)
%D 2009
%E Zhou, Jie
%I Springer
%K dblp
%P 1701-1718
%T Further Study on Proxy Authorization and Its Scheme.
%U http://dblp.uni-trier.de/db/conf/complex/complex2009-2.html#ZhouSW09
%V 5
%@ 978-3-642-02468-9
@inproceedings{conf/complex/ZhouSW09,
added-at = {2015-03-12T00:00:00.000+0100},
author = {Zhou, Xuanwu and Su, Yang and Wei, Ping},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/208abb7eaea2230c562d326b7e695342e/dblp},
booktitle = {Complex (2)},
crossref = {conf/complex/2009-2},
editor = {Zhou, Jie},
ee = {http://eudl.eu/doi/10.1007/978-3-642-02469-6_48},
interhash = {453b084ae3e714721ae2b4fa42fddc76},
intrahash = {08abb7eaea2230c562d326b7e695342e},
isbn = {978-3-642-02468-9},
keywords = {dblp},
pages = {1701-1718},
publisher = {Springer},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2016-02-02T14:00:05.000+0100},
title = {Further Study on Proxy Authorization and Its Scheme.},
url = {http://dblp.uni-trier.de/db/conf/complex/complex2009-2.html#ZhouSW09},
volume = 5,
year = 2009
}