Login / Signup

Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.

Han-Yu LinTung-Tso TsaiPei-Yih TingYan-Rong Fan
Published in: Sensors (2023)
Keyphrases
  • information retrieval
  • database
  • neural network
  • machine learning
  • knowledge base
  • signature scheme