Author of the publication

Efficient and Secure Certificateless Proxy Re-Encryption.

, , and . KSII Trans. Internet Inf. Syst., 11 (4): 2254-2275 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Higncryption., and . IACR Cryptology ePrint Archive, (2019)Integrating Gaussian Process with Reinforcement Learning for Adaptive Service Composition., , , and . ICSOC, volume 9435 of Lecture Notes in Computer Science, page 203-217. Springer, (2015)Integrating Reinforcement Learning with Multi-Agent Techniques for Adaptive Service Composition., , , , , , and . ACM Trans. Auton. Adapt. Syst., 12 (2): 8:1-8:42 (2017)Identity-based authenticated encryption with identity confidentiality., , and . Theor. Comput. Sci., (2022)Delegatable Order-Revealing Encryption., , and . AsiaCCS, page 134-147. ACM, (2019)Integrating Trust with User Preference for Effective Web Service Composition., , , , and . IEEE Trans. Serv. Comput., 10 (4): 574-588 (2017)Component Oriented Modelling and Design of Fuzzy Control Scheme for a Class of Pneumatic Actuators., , and . J. Intell. Fuzzy Syst., 5 (3): 229-243 (1997)Online reliability time series prediction via convolutional neural network and long short term memory for service-oriented systems., , , , and . Knowl. Based Syst., (2018)Adaptive and large-scale service composition based on deep reinforcement learning., , , , , , , , and . Knowl. Based Syst., (2019)A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption., , and . Secur. Commun. Networks, 7 (1): 14-32 (2014)