Amanote Research
Register
Sign In
Provably Secure Identity-Based Encryption Resilient to Post-Challenge Continuous Auxiliary Input Leakage
Security and Communication Networks
- Egypt
doi 10.1002/sec.1396
Full Text
Open PDF
Abstract
Available in
full text
Categories
Computer Networks
Information Systems
Communications
Date
December 18, 2015
Authors
Jiguo Li
Yuyan Guo
Qihong Yu
Yang Lu
Yichen Zhang
Publisher
Wiley