On the Security of Group-based Proxy Re-encryption Scheme.
B. R. PurushothamaB. B. AmberkerPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- information security
- access control
- security issues
- intrusion detection
- security requirements
- information assurance
- data security
- information systems
- statistical databases
- network security
- data sets
- functional requirements
- cryptographic protocols
- security problems
- group members
- computer security
- data integrity
- website
- security systems
- user authentication