![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Wang Li-Ping
Publisher: Springer Publishing Company
ISSN: 1936-2447
Source: Cryptography and Communications, Vol.3, Iss.1, 2011-03, pp. : 29-42
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Lattice‐based obfuscation for re‐encryption functions
SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol. 8, Iss. 9, 2015-06 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)