Author: Li Qinyi Xiong Hu Zhang Fengli
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.8, Iss.1, 2013-07, pp. : 1-12
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Attribute-based encryption without key cloning
International Journal of Applied Cryptography, Vol. 2, Iss. 3, 2012-02 ,pp. :