الفهرس | Only 14 pages are availabe for public view |
Abstract This results that any attack will be resisted because the key is hidden and locked secretly by the data owner.this technique is resilient to different types:basic malicious attack, flase proof/claim of ownership. |