Login / Signup

A new proxy re-encryption scheme for protecting critical information systems.

Xu An WangJianfeng MaXiaoyuan Yang
Published in: J. Ambient Intell. Humaniz. Comput. (2015)
Keyphrases
  • critical information
  • computer systems
  • computational intelligence
  • communication networks