User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environment...
Saved in:
Main Authors: | Tarun Kumar, Prabhat Kumar, Suyel Namasudra |
---|---|
Format: | Article |
Language: | English |
Published: |
Universidad Internacional de La Rioja (UNIR)
2025-01-01
|
Series: | International Journal of Interactive Multimedia and Artificial Intelligence |
Subjects: | |
Online Access: | https://www.ijimai.org/journal/bibcite/reference/3451 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Efficient traceable identity-based signature scheme
by: DU Hong-zhen1, et al.
Published: (2009-01-01) -
Electronic cash system based on certificateless group signature
by: Yan LIANG, et al.
Published: (2016-05-01) -
Realization of smart home key management mechanism based on ECC
by: Wenbin CHENG, et al.
Published: (2017-06-01) -
Generalization and improvement of Nyberg-Rueppel message recovery blind signatures
by: HUANG Zhen-jie1, et al.
Published: (2005-01-01) -
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
by: Yevhen Kotukh, et al.
Published: (2024-06-01)