Login / Signup
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
Han-Yu Lin
Tung-Tso Tsai
Pei-Yih Ting
Yan-Rong Fan
Published in:
Sensors (2023)
Keyphrases
</>
information retrieval
database
neural network
machine learning
knowledge base
signature scheme