A new proxy re-encryption scheme for protecting critical information systems
Crossref DOI link: https://doi.org/10.1007/s12652-015-0261-3
Published Online: 2015-03-19
Published Print: 2015-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Wang, Xu An
Ma, Jianfeng
Yang, Xiaoyuan
Text and Data Mining valid from 2015-03-19