Login / Signup
Secure Encrypted Data Deduplication with Ownership Proof and User Revocation.
Wenxiu Ding
Zheng Yan
Robert H. Deng
Published in:
ICA3PP (2017)
Keyphrases
</>
key management
user interface
sensitive data
databases
data mining
information systems
end users
image compression
third party
encryption scheme