Login / Signup
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks.
Shravani Mahesh Patil
B. R. Purushothama
Published in:
J. Inf. Secur. Appl. (2020)
Keyphrases
</>
resource constrained
sensor networks
resource constraints
wireless sensor networks
visual sensor networks
resource limitations
distributed databases
rfid tags
multipath
low cost
optimal solution
np hard
response time
data collection
constraint satisfaction problems
cost effective