Login / Signup

An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network.

Huawei WangYe LiYingnan JiaoZhengping Jin
Published in: Int. J. Distributed Sens. Networks (2019)
Keyphrases
  • mobile networks
  • encryption scheme
  • mobile users
  • real time
  • wireless networks
  • third party