Login / Signup
A System for Secure Person-to-Person Contents Sharing Employing Broadcast Encryption and Certain Third Party.
Shinako Matsuyama
Published in:
DEXA Workshops (2005)
Keyphrases
</>
third party
personal information
key management
sensitive information
sensitive data
encryption scheme
security analysis
key exchange
encrypted data
reverse logistics
metadata
data providers
trusted third party
data encryption
integrity verification