News

Research on End-to-End Encryption Algorithm Design System Integrating Computer Wireless Communication Technology ...
Data is never more vulnerable than when it’s in use. That’s exactly where confidential computing steps in to strengthen ...
Therefore, this paper proposes fair-and-exculpable-attribute-based searchable encryption with revocation and verifiable outsourced decryption (FE-ABSE-RV) Using Smart Contract, and constructs a ...