Login / Signup

Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing.

Yanjiang YangLiang GuFeng Bao
Published in: INTRUST (2010)
Keyphrases