Abstract: Ciphertext retrieval technology has been widely explored with the increasing popularity of cloud computing. Proxy re-encryption with Keyword search (PREKS) can support multi-user retrieval ...
Abstract: Under the background of multi-channel and multi-network interwoven transmission, a large amount of information has been realized about long-distance transmission across the region and over ...
The Internet of Things (IoT) security is a highly challenging research domain. The IoT user devices frequently function in vulnerable platforms that cause many security problems that can be considered ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results