Login / Signup
Analysis of hierarchical identity based encryption schemes and its applicability to computing environments.
Renu Mary Daniel
Elijah Blessing Rajsingh
Salaja Silas
Published in:
J. Inf. Secur. Appl. (2017)
Keyphrases
</>
computing environments
encryption scheme
data analysis
intelligent systems
security analysis