Login / Signup

Secure Encrypted Data Deduplication with Ownership Proof and User Revocation.

Wenxiu DingZheng YanRobert H. Deng
Published in: ICA3PP (2017)
Keyphrases
  • key management
  • user interface
  • sensitive data
  • databases
  • data mining
  • information systems
  • end users
  • image compression
  • third party
  • encryption scheme