Login / Signup

Identity-based encryption from algorithm to enterprise deployment.

Guido Appenzeller
Published in: CCS (2005)
Keyphrases
  • computational complexity
  • tree structure
  • sensor networks
  • database
  • information retrieval
  • similarity measure
  • intrusion detection