Impact Factor
7.883
Call For Paper
Volume: 11 Issue 01 January 2025
LICENSE
Proxy Re-encryption Scheme For Cloud Computing With Public Verifier
-
Author(s):
S. R. Ashmi | Mrs. M. Supriya, M.E, Ph.D
-
Keywords:
Access Control, Attribute-based Encryption, Blockchain, Secure Search, Attribute Revocation.
-
Abstract:
With The Rapid Development Of Cloud Computing Technology, How To Achieve Secure Access To Cloud Data Has Become A Current Research Hotspot. Attribute-based Encryption Technology Provides The Feasibility To Achieve The Above Goal. However, Most Of The Exis
Other Details
-
Paper id:
IJSARTV9I1072449
-
Published in:
Volume: 9 Issue: 10 October 2023
-
Publication Date:
2023-10-06
Download Article