How to construct secure proxy cryptosystem

Sorry, there's nothing here.

Topics

Cite this paper

@article{Zhou2007HowTC, title={How to construct secure proxy cryptosystem}, author={Yuan Zhou and Binxing Fang and Zhenfu Cao and Xiao-chun Yun and Xiaoming Cheng}, journal={Inf. Sci.}, year={2007}, volume={177}, pages={4095-4108} }