This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible—even to those with access to secret keys.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
EUR 4,69 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisVendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9798896320104_new
Quantité disponible : Plus de 20 disponibles
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Neuware - This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. N° de réf. du vendeur 9798896320104
Quantité disponible : 2 disponible(s)
Vendeur : CitiRetail, Stevenage, Royaume-Uni
Paperback. Etat : new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. N° de réf. du vendeur 9798896320104
Quantité disponible : 1 disponible(s)
Vendeur : AussieBookSeller, Truganina, VIC, Australie
Paperback. Etat : new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. N° de réf. du vendeur 9798896320104
Quantité disponible : 1 disponible(s)
Vendeur : Grand Eagle Retail, Fairfield, OH, Etats-Unis
Paperback. Etat : new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9798896320104
Quantité disponible : 1 disponible(s)