User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environment...
Saved in:
| Main Authors: | Tarun Kumar, Prabhat Kumar, Suyel Namasudra |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universidad Internacional de La Rioja (UNIR)
2025-01-01
|
| Series: | International Journal of Interactive Multimedia and Artificial Intelligence |
| Subjects: | |
| Online Access: | https://www.ijimai.org/journal/bibcite/reference/3451 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages
by: Juhari Juhari, et al.
Published: (2022-10-01) -
Electronic cash system based on certificateless group signature
by: Yan LIANG, et al.
Published: (2016-05-01) -
Security notions for stateful signature schemes
by: Quan Yuan, et al.
Published: (2022-01-01) -
Efficient traceable identity-based signature scheme
by: DU Hong-zhen1, et al.
Published: (2009-01-01) -
Lattice‐based nominative signature using pseudorandom function
by: Meenakshi Kansal, et al.
Published: (2021-07-01)