Sign in

Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.

Zhen LiuDuncan S. Wong
Published in: Comput. J. (2016)
Keyphrases
  • access control
  • power consumption
  • access structure