2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2010
DOI: 10.1109/euc.2010.104
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Self-Destructing Scheme for Electronic Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The realization of this method is simp ler than that of Xiong [11][12][13], and the algorithms have good commonality in practice. The method of passive control fro m Yue [ 14] is converted to active setting control conditions of deadline and access times while this method does not need Lagrange theorem for encrypting and checking the documents every 8 hours. Embodied in the following four points:…”
Section: Contrast T O T He Exist Ing T Echnologiesmentioning
confidence: 99%
See 2 more Smart Citations
“…The realization of this method is simp ler than that of Xiong [11][12][13], and the algorithms have good commonality in practice. The method of passive control fro m Yue [ 14] is converted to active setting control conditions of deadline and access times while this method does not need Lagrange theorem for encrypting and checking the documents every 8 hours. Embodied in the following four points:…”
Section: Contrast T O T He Exist Ing T Echnologiesmentioning
confidence: 99%
“…In the papers of Xiong"s [11][12][13] and Yue"s [14], the keys are drawn fro m ciphertext and stored in DHT. The keys need to transfer through various channels, some are trusted and some are not.…”
Section: Contrast Of Key Complexitymentioning
confidence: 99%
See 1 more Smart Citation