Login / Signup

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.

Tsz Hon YuenYe ZhangSiu-Ming YiuJoseph K. Liu
Published in: ESORICS (1) (2014)
Keyphrases