Wearable devices can be potentially captured or accessed in an unauthorized manner because of their physical nature.In such cases,they are in white-box atta
Efficient searching on encrypted data outsourced to the cloud remains a research challenge.Identity-based encryption with equality test (IBEET) scheme has r
Introduced in 2001, a ring signature is a type of digital signature that can be created by anyone in a group of people.In contrast to group signatures, ring