• No results found

An Improved Algorithm for Multi Owner Data Sharing using Policy based Signcryption in Clouds

N/A
N/A
Protected

Academic year: 2020

Share "An Improved Algorithm for Multi Owner Data Sharing using Policy based Signcryption in Clouds"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1. Comparison of Encryption Cost of Users
Figure 3. Comparison of Computational Cost for Key Generation
Table 2. Analysis of Computational Cost for Key Generation

References

Related documents

applications. Furtherm~re, some estimators exhibit lower convergence rates than ..[ii, have non-normal distributions and may require bootstrapping in order to obtain the distrubution

This understanding is seen in the nature of Estonia cyber security policy and strategies, which focus on resilience and agility of Estonian cyberspace.

Despite the importance of doctoral student education and preparation in the counseling profession, and, an extensive body of research about clinical supervision, there is a paucity of

In order to have an indoor GIS that can be properly managed, a dedicated database is needed, and a server to provide data to the client application.. To manage all the processes

with a destination point in zone l.. Figure 3: An example of a road network, divided into its cruising zones, and the corresponding Markov chain, modeling a taxi operating on

According to the case-law of the European Court of Human Rights (hereinafter: Court) Article 1 protects only existing property and does not grant right to regain property

When a terminal session is initiated from the Telnet session to an interactive service (using the CONNECT command), a dynamic connection is established between the dedicated

Aim: The aim of this study was to evaluate the susceptibility of HCWs to HBV infec- tion in the representative Tripoli Central Hospital in Libya and prepare a practical guideline