This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible—even to those with access to secret keys.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 5,81 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9798896320104_new
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Bestandsnummer des Verkäufers 9798896320104
Anzahl: 2 verfügbar
Anbieter: CitiRetail, Stevenage, Vereinigtes Königreich
Paperback. Zustand: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Bestandsnummer des Verkäufers 9798896320104
Anzahl: 1 verfügbar
Anbieter: AussieBookSeller, Truganina, VIC, Australien
Paperback. Zustand: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. Bestandsnummer des Verkäufers 9798896320104
Anzahl: 1 verfügbar
Anbieter: Grand Eagle Retail, Fairfield, OH, USA
Paperback. Zustand: new. Paperback. This book introduces a robust cryptographic approach that empowers data owners with complete control over their sensitive information. By leveraging advanced attribute-based encryption techniques, it provides a systematic methodology for encrypting, outsourcing, and permanently deleting data. With a focus on user-defined deletion policies and puncture-based cipher text management, this framework ensures that once deleted, the data remains inaccessible-even to those with access to secret keys. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9798896320104
Anzahl: 1 verfügbar