Login / Signup
An authenticated re-encryption scheme for secure file transfer in named data networks.
Yi-Fan Tseng
Chun-I Fan
Yan-Fu Cho
Published in:
Int. J. Commun. Syst. (2018)
Keyphrases
</>
data sets
data points
security analysis
image data
high quality
data analysis
encryption scheme
database
data structure
similarity search
database applications
data distribution