

Author: Tian Miaomiao Huang Liusheng Yang Wei
Publisher: Inderscience Publishers
ISSN: 1751-911X
Source: International Journal of Electronic Security and Digital Forensics, Vol.5, Iss.1, 2013-06, pp. : 1-10
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








An Improved Identity-Based Ring Signcryption Scheme
By Deng Lunzhi
Information Security Journal: A Global Perspective, Vol. 22, Iss. 1, 2013-01 ,pp. :