Sign in

Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.

Zechao LiuZoe Lin JiangXuan WangSiu-Ming Yiu
Published in: J. Netw. Comput. Appl. (2018)
Keyphrases