Shetty, Sachin; Liang, Xueping; Tosh, Deepak K.; Zhao, Juan - In: International Journal of Information Security and … 12 (2018) 4, pp. 68-81
architecture is capable of assured data provenance validation and user privacy preservation at a low overhead. …