On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.
Jian WengYunlei ZhaoPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- information security
- public key cryptography
- security systems
- access control
- intrusion detection
- security issues
- security requirements
- computer security
- security policies
- security services
- information assurance
- databases
- security measures
- security threats
- statistical databases
- case study
- cyber security
- public key
- security level
- network management
- sensor networks
- data mining