Chrome Extension
WeChat Mini Program
Use on ChatGLM

Hierarchal Bilateral Access Control with Constant Size Ciphertexts for Mobile Cloud Computing

IEEE Transactions on Cloud Computing(2024)

Cited 0|Views11
Key words
Access control,Cloud computing,Privacy,Encryption,Computational modeling,Receivers,Costs,Bilateral access control,constant size ciphertexts,hierarchal identity structure,mobile cloud computing
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined