Fingerprint
Dive into the research topics of 'Security vulnerability in a non-interactive ID-based proxy re-encryption scheme'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Woo Kwon Koo, Jung Yeon Hwang, Dong Hoon Lee
Research output: Contribution to journal › Article › peer-review