A Survey Paper on Securing Cloud Computing using Attribute based Signatures
暂无分享,去创建一个
In the realm of specialized life distributed computing has ended up basic part furthermore understanding the method for business is changing and is prone to keep changing into what's to come. Utilizing distributed storage administrations implies that you and others can get to and offer documents over a scope of gadgets and position. Records, for example, photographs and recordings can once in a while be unmanageable to email in the event that they are too enormous or you have apportion of information.
[1] Xavier Boyen,et al. Mesh Signatures , 2007, EUROCRYPT.
[2] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.