Author of the publication

Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model.

, , , and . J. Inf. Secur. Appl., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust adaptive control of hypersonic flight vehicle with asymmetric AOA constraint., , , , , and . Sci. China Inf. Sci., (2020)Robust Adaptive Neural Fault-Tolerant Control of Hypersonic Flight Vehicle., , and . ICCSIP, volume 710 of Communications in Computer and Information Science, page 44-51. Springer, (2016)Improvement of Energy Detection with Cooperative Sensing., and . AIIPCC, page 74-78. IEEE, (2022)Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model., , , and . FCS, volume 879 of Communications in Computer and Information Science, page 110-118. Springer, (2018)Strand Space Model of Amended NS Protocol and Its Analysis., and . CSIE (1), page 439-442. IEEE Computer Society, (2009)Disturbance observer based control of quadrotors with SLFN., , , , and . IECON, page 5774-5778. IEEE, (2017)Composite learning adaptive sliding mode control for AUV target tracking., , , , , and . Neurocomputing, (2019)Finite-Time Deterministic Learning Command Filtered Control for Hypersonic Flight Vehicle., and . IEEE Trans. Aerosp. Electron. Syst., 58 (5): 4214-4225 (2022)Neural Back-Stepping Control of Hypersonic Flight Vehicle with Actuator Fault., and . J. Control. Sci. Eng., (2018)Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage., , , and . IEEE Trans. Computers, 71 (1): 175-184 (2022)