Login / Signup

Security vulnerability in a non-interactive ID-based proxy re-encryption scheme.

Woo Kwon KooJung Yeon HwangDong Hoon Lee
Published in: Inf. Process. Lett. (2009)
Keyphrases