Login / Signup
Proxy visible re-encryption scheme with application to e-mail forwarding.
Gaurav Pareek
B. R. Purushothama
Published in:
SIN (2017)
Keyphrases
</>
email
encryption scheme
standard model
databases
proxy re encryption
digital libraries
knn
similarity search
security analysis
diffie hellman