Abstract: Public-key Encryption with Keyword Search (PEKS) enables users to search encrypted data stored on an untrusted server without revealing any sensitive information. However, existing PEKS ...
Abstract: This paper investigates the bounded filtering problem for two-dimensional (2-D) discrete systems with encryption-decryption mechanism (EDM) and dynamic event-triggered mechanism (ETM).
Privacy advocates are worried about the precedent this sets and the potential for abuse. Privacy advocates are worried about the precedent this sets and the potential ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results