Login / Signup
Mitigating Key Escrow in Attribute-Based Encryption.
Yongtao Wang
Xiaonan Liu
Lulu Liang
Weiduan Feng
Guang Yang
Published in:
Int. J. Netw. Secur. (2015)
Keyphrases
</>
database
third party
access structure