Login / Signup
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group.
Yu Zhang
Yin Li
Yifan Wang
Published in:
Secur. Commun. Networks (2019)
Keyphrases
</>
resource constrained
security mechanisms
key management
public key encryption
wireless sensor networks
resource constraints
sensor networks
cost effective
real time
software engineering