Login / Signup

Analysis of hierarchical identity based encryption schemes and its applicability to computing environments.

Renu Mary DanielElijah Blessing RajsinghSalaja Silas
Published in: J. Inf. Secur. Appl. (2017)
Keyphrases
  • computing environments
  • encryption scheme
  • data analysis
  • intelligent systems
  • security analysis