Login / Signup

Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.

Jin WangXi BaiJia YuDaxing Li
Published in: TAMC (2007)
Keyphrases
  • real time
  • real world
  • website
  • genetic algorithm
  • information systems
  • knowledge base
  • image sequences
  • access control