Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.
Abstract: This With the wide application of microservice technology and container technology, the configuration management of distributed system becomes very important. As an open source, distributed ...
Abstract: This paper mainly focuses on the symmetric encryption and decryption of shared data. In the traditional symmetric encryption technology, sharing an identical key is safe for both ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results