Search

Showing total 3 results
3 results

Search Results

1. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

2. Testing the event witnessing status of micro-bloggers from evidence in their micro-blogs.

3. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.