Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

On the security of two multi-use CCA-secure proxy re-encryption schemes
Jindan Zhang; Xu An Wang; Yi Ding; Xiaoyuan Yang
International Journal of Intelligent Information and Database Systems (IJIIDS), 2013 Vol.7 No.5, pp.422 - 440
20 + 16 =

Thank you for your feedback.