Publication not explained
This publication has not yet been explained in plain language by the author(s). However, you can still read the publication.
If you are one of the authors, claim this publication so you can create a plain language summary to help more people find, understand and use it.
Featured Image
Read the Original
This page is a summary of: Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data, April 2015, ACM (Association for Computing Machinery),
DOI: 10.1145/2714576.2714632.
You can read the full text:
Contributors
The following have contributed to this page