Some Graph Parameters on the Composite Order Cayley Graph.Published in:Caspian Journal of Mathematical Sciences, 2019, v. 8, n. 1, p. 10By:Tolue, BehnazPublication type:Article
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption.Published in:Security & Communication Networks, 2014, v. 7, n. 11, p. 1988, doi. 10.1002/sec.913By:Doshi, Nishant;Jinwala, Devesh C.Publication type:Article