Login / Signup

Threshold Certificate-based Encryption.

Yang LuJiguo LiJunmo Xiao
Published in: J. Softw. (2009)
Keyphrases
  • public key infrastructure
  • encryption scheme
  • threshold selection
  • security analysis
  • encryption algorithm
  • encryption decryption
  • roc curve
  • key exchange
  • encryption algorithms
  • identity based encryption