Login / Signup
Token-Controlled Public Key Encryption.
Joonsang Baek
Reihaneh Safavi-Naini
Willy Susilo
Published in:
ISPEC (2005)
Keyphrases
</>
public key encryption
proxy re encryption
information retrieval
public key
databases
information extraction
encryption scheme
standard model