Abstract: The dynamic dissemination of sensitive documents across multi-hop networks necessitates rigorous data provenance. However, existing methods face significant challenges: traditional audit ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results