Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Secure delegation of services through proxy signature with revocation
Deepnarayan Tiwari; G.R. Gangadharan; Maode Ma
International Journal of Trust Management in Computing and Communications (IJTMCC), 2016 Vol.3 No.4, pp.291 - 318
13 - 14 =

Thank you for your feedback.