![Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System](https://www.pdfsearch.io/img/d7cbba28892279364feae1c26401d59b.jpg) Date: 2015-06-03 03:06:48Cryptography Public-key cryptography Identity-based cryptography Attribute-based encryption Cloud computing security Encryption ID-based encryption Cipher Identity-based conditional proxy re-encryption Encrypting File System | | ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International JournalAdd to Reading ListSource URL: www.ijmetmr.comDownload Document from Source Website File Size: 1,13 MBShare Document on Facebook
|