Login / Signup
A new proxy re-encryption scheme for protecting critical information systems.
Xu An Wang
Jianfeng Ma
Xiaoyuan Yang
Published in:
J. Ambient Intell. Humaniz. Comput. (2015)
Keyphrases
</>
critical information
computer systems
computational intelligence
communication networks