Sign in

Certificate-based encryption resilient to key leakage.

Qihong YuJiguo LiYichen ZhangWei WuXinyi HuangYang Xiang
Published in: J. Syst. Softw. (2016)
Keyphrases
  • high security
  • real time
  • databases
  • neural network
  • data encryption standard
  • information hiding