Abstract: Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results