Accès libre

A Searchable Re-encryption Storage Method in Cloud Environment

,  et   
07 mai 2018
À propos de cet article

Citez
Télécharger la couverture

TABLE I.

SYMBOL DEFINITION
SYMBOL DEFINITION
undefined
undefined
undefined
undefined
undefined
undefined

TABLE II.

THE PERFORMANCE OF THE MOBILE END UPLOAD THE DATA
THE PERFORMANCE OF THE MOBILE END UPLOAD THE DATA

TABLE III.

THE PERFORMANCE OF THE MOBILE END DOWNLOAD THE DATA
THE PERFORMANCE OF THE MOBILE END DOWNLOAD THE DATA

TABLE IV.

TIME COMPARISON ON ENCRYPTION AND DECRYPTION BY USING SRECSM
TIME COMPARISON ON ENCRYPTION AND DECRYPTION BY USING SRECSM

Figure 1.

Comparison of Re-encryption time
Comparison of Re-encryption time

TABLE V.

TIME COMPARISON FOR DIFFERENT ALGORITHM ENCRYPTION
TIME COMPARISON FOR DIFFERENT ALGORITHM ENCRYPTION

Figure 2.

Comparison while increasing the number of keywords
Comparison while increasing the number of keywords

Figure 3.

Comparison while re-encryption and decryption
Comparison while re-encryption and decryption

Figure 4.

The reliability contrast diagram
The reliability contrast diagram
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Informatique, Informatique, autres