WeChat Mini Program
Old Version Features

DLT-based Personal Data Access Control with Key-Redistribution

Cluster Computing(2025)

Cited 0|Views0
Key words
Proxy re-encryption,Threshold scheme,GDPR,Data sharing,Decentralized file system
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined