Xu an Wang, Xiaoyuan Yang. Proxy Re-encryption Scheme Based on SK Identity Based Encryption. In Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi An, China, 18-20 August 2009. pages 657-660, IEEE Computer Society, 2009. [doi]
@inproceedings{WangY09-7, title = {Proxy Re-encryption Scheme Based on SK Identity Based Encryption}, author = {Xu an Wang and Xiaoyuan Yang}, year = {2009}, doi = {10.1109/IAS.2009.191}, url = {http://dx.doi.org/10.1109/IAS.2009.191}, tags = {rule-based}, researchr = {https://researchr.org/publication/WangY09-7}, cites = {0}, citedby = {0}, pages = {657-660}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi An, China, 18-20 August 2009}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3744-3}, }