![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Yang Chao-Lin Li Chuan-Ming Hwang Tzonelih
Publisher: Taylor & Francis Ltd
ISSN: 0020-7160
Source: International Journal of Computer Mathematics, Vol.86, Iss.5, 2009-05, pp. : 753-770
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Identity‐based signcryption from lattices
SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol. 8, Iss. 18, 2015-12 ,pp. :