Login / Signup
Efficient Authenticated Encryption Schemes with Public Verifiability
Guilin Wang
Feng Bao
Changshe Ma
Kefei Chen
Published in:
CoRR (2005)
Keyphrases
</>
encryption scheme
databases
image processing
digital libraries
query processing
cost effective
data sharing
public key
secret sharing
public key encryption