Author of the publication

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.

, , , and . Future Gener. Comput. Syst., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance., , , and . Future Gener. Comput. Syst., (2019)Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things., , , , , and . IEEE Trans. Cloud Comput., 10 (1): 474-490 (2022)Privacy-preserving Intelligent Traffic Light Control., , , , and . GLOBECOM, page 1-6. IEEE, (2020)Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing., , , , , and . SACMAT, page 143-154. ACM, (2021)Privacy-Preserving Optimal Insulin Dosing Decision., , , , , , and . ICASSP, page 2640-2644. IEEE, (2021)A Privacy-Preserving and Redactable Healthcare Blockchain System., , , , , and . IEEE Trans. Serv. Comput., 17 (2): 364-377 (March 2024)Efficient ciphertext-policy attribute-based encryption with blackbox traceability., , , , , , and . Inf. Sci., (2020)Privacy-enhanced remote data integrity checking with updatable timestamp., , , , and . Inf. Sci., (2020)Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage., , , , and . KSII Trans. Internet Inf. Syst., 13 (11): 5653-5672 (2019)Proxy Signature with Revocation., , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 21-36. Springer, (2016)