Analysis of hierarchical identity based encryption schemes and its applicability to computing environments

Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas. Analysis of hierarchical identity based encryption schemes and its applicability to computing environments. Inf. Sec. Techn. Report, 36:20-31, 2017. [doi]

Abstract

Abstract is missing.