Login / Signup

Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.

Jae Hong SeoKeita Emura
Published in: CT-RSA (2013)
Keyphrases
  • access control
  • sensor networks
  • cost effective
  • knn
  • information extraction
  • conflict resolution