First Page | Document Content | |
---|---|---|
Date: 2005-09-02 12:11:39Key Probabilistic encryption Symmetric-key algorithm Message authentication code Digital signature ID-based encryption Integrated Encryption Scheme Cryptography Key management Public-key cryptography | Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina OpreaAdd to Reading ListSource URL: www.zurich.ibm.comDownload Document from Source WebsiteFile Size: 109,29 KBShare Document on Facebook |