Publisher
Springer International Publishing
Reference57 articles.
1. Lecture Notes in Computer Science;S Agrawal,2017
2. Alwen, J., Barbosa, M., Farshim, P., Gennaro, R., Gordon, S.D., Tessaro, S., Wilson, D.A.: On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. In: Cryptography and Coding (2013)
3. Lecture Notes in Computer Science;G Ateniese,2005
4. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
5. Badertscher, C., Matt, C., Maurer, U.: Strengthening access control encryption (2017)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献