Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
Crossref DOI link: https://doi.org/10.1007/s11859-018-1302-5
Published Online: 2018-03-19
Published Print: 2018-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Gao, Ziyuan
Wang, Baocang
Liu, Hequn
Lu, Ke
Zhan, Yu
Text and Data Mining valid from 2018-03-19
Article History
Received: 20 August 2017
First Online: 19 March 2018