Login / Signup
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation.
Kamalakanta Sethi
Ankit Pradhan
Padmalochan Bera
Published in:
J. Inf. Secur. Appl. (2020)
Keyphrases
</>
ciphertext
attribute based encryption
constraint programming
information technology
real world
information systems
access control
optimal policy
cache management
reinforcement learning
risk management
supplier selection