"Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using ..."

Yanjiang Yang, Liang Gu, Feng Bao (2010)

Details and statistics

DOI: 10.1007/978-3-642-25283-9_13

access: closed

type: Conference or Workshop Paper

metadata version: 2017-11-06

a service of  Schloss Dagstuhl - Leibniz Center for Informatics