Login / Signup
Identity-based encryption from algorithm to enterprise deployment.
Guido Appenzeller
Published in:
CCS (2005)
Keyphrases
</>
computational complexity
tree structure
sensor networks
database
information retrieval
similarity measure
intrusion detection