Return to Article Details
Survey on Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Download
Download PDF