Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - Future Generation Computer Systems, 2013 - Elsevier
Identity-based proxy re-encryption schemes have been proposed to shift the burden of
managing numerous files from the owner to a proxy server. Nevertheless, the existing …

[PDF][PDF] Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - academia.edu
Identity-based proxy re-encryption schemes have been proposed to shit the burden of
managing numerous iles from the owner to a proxy server. Nevertheless, the existing …

Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - Future Generation Computer Systems, 2013 - dl.acm.org
Identity-based proxy re-encryption schemes have been proposed to shift the burden of
managing numerous files from the owner to a proxy server. Nevertheless, the existing …

Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - 2013 - ro.uow.edu.au
Identity-based proxy re-encryption schemes have been proposed to shift the burden of
managing numerous files from the owner to a proxy server. Nevertheless, the existing …

Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - Future Generation Computer Systems, 2013 - infona.pl
Identity-based proxy re-encryption schemes have been proposed to shift the burden of
managing numerous files from the owner to a proxy server. Nevertheless, the existing …

[PDF][PDF] Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - Citeseer
Identity-based proxy re-encryption schemes have been proposed to shift the burden of
managing numerous files from the owner to a proxy server. Nevertheless, the existing …

[PDF][PDF] Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - academia.edu
Identity-based proxy re-encryption schemes have been proposed to shit the burden of
managing numerous iles from the owner to a proxy server. Nevertheless, the existing …

Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - Future Generation Computer Systems, 2013 - infona.pl
Identity-based proxy re-encryption schemes have been proposed to shift the burden of
managing numerous files from the owner to a proxy server. Nevertheless, the existing …