Login / Signup
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.
Zhen Liu
Duncan S. Wong
Published in:
Comput. J. (2016)
Keyphrases
</>
access control
power consumption
access structure