Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud., , , and . IEEE Trans. Cloud Comput., 11 (2): 1886-1898 (April 2023)Cross-Domain Identity-based Matchmaking Encryption., , , , , and . IACR Cryptol. ePrint Arch., (2022)Flexible symmetric predicate encryption for data privacy in IoT environments., , , and . Peer Peer Netw. Appl., 17 (2): 656-664 (March 2024)Cloud-Assisted Laconic Private Set Intersection Cardinality., , , , , and . IEEE Trans. Cloud Comput., 12 (1): 295-305 (January 2024)Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication., , , , , and . Comput. Commun., (2021)A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks., , , , , and . Int. J. Netw. Secur., 22 (5): 874-884 (2020)An Efficient Mobile Location-based Service Framework for Resource-constrained Devices., , , , and . Int. J. Netw. Secur., 22 (4): 698-707 (2020)Lightweight and Privacy-Preserving Data Aggregation for Mobile Multimedia Security., , , and . IEEE Access, (2019)Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks., , , , , and . IEEE Access, (2019)Fuzzy Identity-Based Matchmaking Encryption and Its Application., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)