This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible—even to those with access to secret keys.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 10,67 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiDa: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9798896320104_new
Quantità: Più di 20 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Neuware - This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Codice articolo 9798896320104
Quantità: 2 disponibili
Da: CitiRetail, Stevenage, Regno Unito
Paperback. Condizione: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Codice articolo 9798896320104
Quantità: 1 disponibili
Da: AussieBookSeller, Truganina, VIC, Australia
Paperback. Condizione: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. Codice articolo 9798896320104
Quantità: 1 disponibili
Da: Grand Eagle Retail, Fairfield, OH, U.S.A.
Paperback. Condizione: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Codice articolo 9798896320104
Quantità: 1 disponibili