Date: 2015-07-06 14:15:02Cryptography Public-key cryptography Attribute-based encryption Encryption ID-based encryption Personal health record RSA Key Cipher Data Encryption Standard Cloud computing security Identity-based conditional proxy re-encryption | | ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International JournalAdd to Reading ListSource URL: www.ijmetmr.comDownload Document from Source Website File Size: 493,49 KBShare Document on Facebook
|