Access, view and use Our Site in a web browser (including any web browsing capability built into other types of software or app); Download Our Site (or any part of it) for caching; Print pages from Our Site; Download extracts from pages on Our Site; and Save pages from Our Site for...
A formal definition and IND-CPA security model of RCL-PKE are provided. The RCL-PKE scheme involves three participants, among which KGC can efficiently perform user revocation operations. In the IND-CPA security model, the DKER property is considered, which can resist decryption key leakage attac...
Section 3 presents the definition of the hybrid TOP, and Section 4 describes the proposed methodology of the sim-learnheuristic algorithm. Section 5 carries out a series of computational experiments to illustrate the performance of the proposed algorithm, and Section 6 presents the discussion of the...