Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating

Published: 2018, Last Modified: 23 Jan 2026J. Netw. Comput. Appl. 2018EveryoneRevisionsBibTeXCC BY-SA 4.0
Loading