Search Results - (( protocol distributed force algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 2 results of 2
Refine Results
  1. 1
  2. 2

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…An adversary can force the authority to produce false private keys that can tarnish the integrity of the ABE system. …”
    Get full text
    Get full text
    Thesis