K-times Proxy Re-encryption | IEEE Conference Publication | IEEE Xplore