Search Results - (( java implication based algorithm ) OR ( based certification force algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1
  2. 2
  3. 3

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Although the key generator is distributed among the authority nodes, the decision to generate user credential is based on a single decision. An adversary can force the authority to produce false private keys that can tarnish the integrity of the ABE system. …”
    Get full text
    Get full text
    Thesis