Publication | Closed Access
Multi-use and unidirectional identity-based proxy re-encryption schemes
63
Citations
12
References
2010
Year
EngineeringInformation SecurityCryptographic ProtectionIdentity-based SecurityData PrivacyAuthentication ProtocolData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1