Login / Signup
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
Jae Hong Seo
Keita Emura
Published in:
CT-RSA (2013)
Keyphrases
</>
access control
sensor networks
cost effective
knn
information extraction
conflict resolution