Login / Signup
An Efficiently Revocable Cloud-based Access Control Using Proxy Re-encryption and Blockchain.
Khanadech Worapaluk
Somchart Fugkeaw
Published in:
JCSSE (2023)
Keyphrases
</>
proxy re encryption
standard model
cloud computing
security model
information retrieval
information systems
relational databases
low cost
public key encryption