Return to Article Details A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context Download Download PDF