Author of the publication

Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably Secure (Broadcast) Homomorphic Signcryption., , , and . Int. J. Found. Comput. Sci., 30 (4): 511-529 (2019)Multi-authority security framework for scalable EHR systems., , , and . Int. J. Medical Eng. Informatics, 8 (4): 390-408 (2016)CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data., , , , , and . IEEE Trans. Serv. Comput., 16 (2): 1011-1022 (March 2023)Controllable software licensing system for sub-licensing., , , , and . J. Inf. Secur. Appl., (2022)Blockchain-based deduplication with arbitration and incentives., , , , , and . IET Inf. Secur., 16 (6): 401-416 (2022)Structured encryption for knowledge graphs., , , , , and . Inf. Sci., (2022)Fully Secure Lightweight Certificateless Signature Scheme for IIoT., , , , and . IEEE Access, (2019)Collusion resistant multi-authority access control scheme with privacy protection for personal health records., , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (8): 101677 (September 2023)Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example., , , , and . IEEE Netw., 35 (6): 240-246 (2021)HUCDO: A Hybrid User-centric Data Outsourcing Scheme., , , , , , , , , and 1 other author(s). ACM Trans. Cyber Phys. Syst., 4 (3): 35:1-35:23 (2020)