Sign in

Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage.

Hong-xia HouBo YangMingrui ZhangYanwei ZhouMeijuan Huang
Published in: J. Inf. Secur. Appl. (2020)
Keyphrases