B Wang,
B Li,
H Li - Applied Cryptography and Network Security: 10th …, 2012 - Springer
With cloud computing and storage services, data is not only stored in the cloud, but routinely
shared among a large number of users in a group. It remains elusive, however, to design an …