Login / Signup
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
Jin Wang
Xi Bai
Jia Yu
Daxing Li
Published in:
TAMC (2007)
Keyphrases
</>
real time
real world
website
genetic algorithm
information systems
knowledge base
image sequences
access control