Publication | Closed Access
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
165
Citations
17
References
2014
Year
EngineeringEncrypted StorageInformation SecurityCloud ComputingData-centric SecurityData PrivacyCloud CryptographyCloud Computing SecurityCloud DataEnd-to-end EncryptionData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1