Ping Wei, Xu an Wang, Xiaoyuan Yang. Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys. In Zhengbing Hu, Ping Ma, editors, Second International Workshop on Database Technology and Applications, DBTA 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings. pages 1-4, IEEE, 2010. [doi]
@inproceedings{WeiWY10-0, title = {Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys}, author = {Ping Wei and Xu an Wang and Xiaoyuan Yang}, year = {2010}, doi = {10.1109/DBTA.2010.5658954}, url = {http://dx.doi.org/10.1109/DBTA.2010.5658954}, researchr = {https://researchr.org/publication/WeiWY10-0}, cites = {0}, citedby = {0}, pages = {1-4}, booktitle = {Second International Workshop on Database Technology and Applications, DBTA 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings}, editor = {Zhengbing Hu and Ping Ma}, publisher = {IEEE}, isbn = {978-1-4244-6977-2}, }