Login / Signup

An authenticated re-encryption scheme for secure file transfer in named data networks.

Yi-Fan TsengChun-I FanYan-Fu Cho
Published in: Int. J. Commun. Syst. (2018)
Keyphrases
  • data sets
  • data points
  • security analysis
  • image data
  • high quality
  • data analysis
  • encryption scheme
  • database
  • data structure
  • similarity search
  • database applications
  • data distribution