Return to Article Details
Sharing of Data Using Key Aggregation and Searchable Encryption
Download
Download PDF