Secure Data Sharing Using Two Fold Cryptography Key Protection, Proxy Re-encryption and Key Separation Techniques
Crossref DOI link: https://doi.org/10.1007/978-981-15-7961-5_29
Published Online: 2020-10-12
Published Print: 2021
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Uma Vishweshwar, D.
BalaRam, A.
Kishore Babu, T.
Text and Data Mining valid from 2020-10-12
Version of Record valid from 2020-10-12
Chapter History
First Online: 12 October 2020