Publication | Closed Access
Cloud based data sharing with fine-grained proxy re-encryption
96
Citations
16
References
2015
Year
BlockchainEngineeringEncrypted StorageInformation SecurityFine-grained Proxy Re-encryptionCloud ComputingData PrivacyCloud CryptographyCloud Computing SecurityData ManagementData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1