Hierarchal Bilateral Access Control with Constant Size Ciphertexts for Mobile Cloud Computing
IEEE Transactions on Cloud Computing(2024)
Key words
Access control,Cloud computing,Privacy,Encryption,Computational modeling,Receivers,Costs,Bilateral access control,constant size ciphertexts,hierarchal identity structure,mobile cloud computing
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined