Abstract: Access control schemes in predicate encryption can effectively reduce the risk of information leakage in the inner product function encryption (IPFE). However, when we try to transition from ...
Abstract: Existing methods for reversible data hiding in ciphertext binary images only involve one data hider to perform data embedding. When the data hider is attacked, the original binary image ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results