Wrench attacks bypass wallets by targeting people. As crypto prices rise and identities leak, physical coercion is becoming ...
Abstract: Access control schemes in predicate encryption can effectively reduce the risk of information leakage in the inner product function encryption (IPFE). However, when we try to transition from ...
Abstract: Federated Learning (FL) is widely used in various industries because it effectively addresses the predicament of isolated data island. However, eavesdroppers is capable of inferring user ...