Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Leakage-resilient identity-based encryption scheme
Sujuan Li; Futai Zhang
International Journal of Grid and Utility Computing (IJGUC), 2013 Vol.4 No.2/3, pp.187 - 196
12 - 1 =

Thank you for your feedback.