@dblp

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.

, , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)

Links and resources

Tags