Login / Signup

Further observation on proxy re-encryption with keyword search.

Xu An WangXinyi HuangXiaoyuan YangLongfei LiuXuguang Wu
Published in: J. Syst. Softw. (2012)
Keyphrases