Login / Signup

Enhanced Certificate-Based Encryption from pairings.

Zuhua Shao
Published in: Comput. Electr. Eng. (2011)
Keyphrases
  • encryption algorithms
  • information systems
  • encryption scheme
  • database systems
  • third party
  • security analysis
  • encryption algorithm