Login / Signup
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Runhua Xu
James Joshi
Published in:
CoRR (2020)
Keyphrases
</>
ad hoc networks
key management
digital signature
key exchange
key establishment
lightweight
security requirements
encryption scheme
security analysis
cryptographic protocols
stream cipher
encryption decryption
encryption key