This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible—even to those with access to secret keys.
"synopsis" may belong to another edition of this title.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 49512590
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 49512590-n
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9798896320104
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
Paperback. Condition: New. Seller Inventory # LU-9798896320104
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9798896320104
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9798896320104_new
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 49512590-n
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 49512590
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Neuware - This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Seller Inventory # 9798896320104