Login / Signup
Practical public key encryption with selective opening security for receivers.
Zhengan Huang
Junzuo Lai
Wenbin Chen
Muhammad Raees-ul-Haq
Liaoliang Jiang
Published in:
Inf. Sci. (2019)
Keyphrases
</>
public key encryption
public key
encryption scheme
intrusion detection
information security
proxy re encryption
network security
security policies
security issues
identity based encryption
database
search engine
security requirements
security model
ciphertext