Login / Signup
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild.
Zhen Liu
Zhenfu Cao
Duncan S. Wong
Published in:
IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
</>
ciphertext
mobile devices
constraint programming
information systems
secret key
mobile applications
smart phones
physical world
encryption scheme
standard model
processing capabilities
embedded systems
constraint satisfaction problems
personal computer
intelligent environments
mobile phone
security model
database