Login / Signup

An Efficiently Revocable Cloud-based Access Control Using Proxy Re-encryption and Blockchain.

Khanadech WorapalukSomchart Fugkeaw
Published in: JCSSE (2023)
Keyphrases
  • proxy re encryption
  • standard model
  • cloud computing
  • security model
  • information retrieval
  • information systems
  • relational databases
  • low cost
  • public key encryption