Login / Signup
Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Peng Jiang
Yi Mu
Fuchun Guo
Xiaofen Wang
Qiaoyan Wen
Published in:
Comput. J. (2016)
Keyphrases
</>
resource constrained
ciphertext
wireless sensor networks
embedded systems
resource constraints
security mechanisms
standard model
sensor networks
rfid tags
real time
proxy re encryption
key management
public key
multipath
encryption scheme
low cost
data sets
sensor nodes
image retrieval
multiscale
image processing