Login / Signup
Threshold Certificate-based Encryption.
Yang Lu
Jiguo Li
Junmo Xiao
Published in:
J. Softw. (2009)
Keyphrases
</>
public key infrastructure
encryption scheme
threshold selection
security analysis
encryption algorithm
encryption decryption
roc curve
key exchange
encryption algorithms
identity based encryption