posted on 2024-11-15, 03:39authored byYing Sun, Yong Yu, Yi Mu
The abstract for this item has not been populated
History
Citation
SUN, Y., Yu, Y. & Mu, Y. (2012). Further analysis of a practical hierarchical identity-based encryption scheme. IEICE Transactions on Information and Systems, E95-D (6), 1690-1693.