Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 13,15
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 21,00
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware - This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys.
EUR 17,45
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 22,51
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Da: Grand Eagle Retail, Fairfield, OH, U.S.A.
EUR 15,91
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.