Skip to main content
Search
Get published
Explore Journals
Books
About
My account
Search all SpringerOpen articles
Search
Cybersecurity
About
Articles
Submission Guidelines
Table 2 Secret keys with each user
From:
Comprehensive evaluation of key management hierarchies for outsourced data
User
Secret keys
A
K
ACD
,
K
AB
B
K
AB
,
K
BC
C
K
ACD
,
K
BC
D
K
ACD
,
K
ABD
Back to article page