Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT (Mobile Networks and Applications, (2021), 26, 4, (1543-1550), 10.1007/s11036-019-01490-6)

Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen*, Yu an Tan

*Corresponding author for this work

Research output: Contribution to journalComment/debate

1 Citation (Scopus)

Abstract

The original version of this article unfortunately contained mistakes in the “Affiliation” and “Acknowledgements” sections. Author Jing Li’s second affiliation “State Key Laboratory of Integrated Service Networks (ISN), Xidian University” and the sentence “This work was still supported by Open Research Project of State Key Laboratory of Integrated Service Networks (No. ISN20-10)” should be added in both sections, respectively. The Affiliation and Acknowledgements sections are updated as below: Acknowledgements This work was supported by National Natural Science Foundation of China (No. 61472091), Natural Science Foundation of Guangdong Province for Distinguished Young Scholars (2014A030306020), Guangzhou scholars project for universities of Guangzhou (No. 1201561613) and Science and Technology Planning Project of Guangdong Province, China (2015B010129015), National Natural Science Foundation of China (No. 61702125, No. 61702126). This work was also supported by the Natural Science Foundation of China (U1936116), the Guangxi Key Laboratory of Cryptography and Information Security (GCIS201807), and by the Program for Innovative Research Team in Education Department of Guangdong Province Under No.2015KCXTD014. and No. 2016KCXTD017. This work was still supported by Open Research Project of State Key Laboratory of Integrated Service Networks (No. ISN20-10).

Original languageEnglish
Pages (from-to)1551
Number of pages1
JournalMobile Networks and Applications
Volume26
Issue number4
DOIs
Publication statusPublished - Aug 2021

Fingerprint

Dive into the research topics of 'Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT (Mobile Networks and Applications, (2021), 26, 4, (1543-1550), 10.1007/s11036-019-01490-6)'. Together they form a unique fingerprint.

Cite this