Year | DOI | Venue |
---|---|---|
2013 | 10.1007/978-3-642-38033-4_5 | ISPEC |
Field | DocType | Citations |
Trusted third party,Computer security,Computer science,Operations research,Encryption,Cryptosystem,Access control,Ciphertext,Delegation,Key escrow,Computer security model | Conference | 1 |
PageRank | References | Authors |
0.35 | 14 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hao Xiong | 1 | 51 | 11.30 |
Tsz Hon Yuen | 2 | 507 | 33.86 |
Cong Zhang | 3 | 13 | 2.94 |
Yi Jun He | 4 | 6 | 2.49 |
Siu-Ming Yiu | 5 | 44 | 13.98 |