Author: Aouinatou Rkia
Publisher: Inderscience Publishers
ISSN: 1744-1765
Source: International Journal of Information and Computer Security, Vol.5, Iss.3, 2013-08, pp. : 171-201
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Attribute-based encryption without key cloning
International Journal of Applied Cryptography, Vol. 2, Iss. 3, 2012-02 ,pp. :
Key Management: The Key to Encryption
EDPACS, Vol. 38, Iss. 4, 2008-10 ,pp. :