Abstract
The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem [...]
Chemistry, Analytical
Engineering, Civil
Engineering, Manufacturing
Economics
Psychology, Social
Demography
Computer Science, Software Engineering
Energy & Fuels