"Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy ..."

Satsuya Ohata et al. (2015)

Details and statistics

DOI:

access: open

type: Informal or Other Publication

metadata version: 2020-05-11