Abstract: Ciphertext retrieval technology has been widely explored with the increasing popularity of cloud computing. Proxy re-encryption with Keyword search (PREKS) can support multi-user retrieval ...
Abstract: Under the background of multi-channel and multi-network interwoven transmission, a large amount of information has been realized about long-distance transmission across the region and over ...
The Internet of Things (IoT) security is a highly challenging research domain. The IoT user devices frequently function in vulnerable platforms that cause many security problems that can be considered ...