Author of the publication

Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System., , , , and . IACR Cryptol. ePrint Arch., (2024)Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients., , , and . HPCC/DSS/SmartCity, page 816-823. IEEE, (2020)Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement., , , and . Comput. Stand. Interfaces, (2018)Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing., , and . IEEE Access, (2020)Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud., , , and . IEEE Access, (2019)An Efficient Differential Privacy Logistic Classification Mechanism., , , and . IEEE Internet Things J., 6 (6): 10620-10626 (2019)Analysis of an Identity-Based Signcryption Scheme in the Standard Model., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 268-269 (2011)Security Analysis of an Identity-Based Signature From Factorization Problem., , , and . IEEE Access, (2020)Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions., , , , , and . J. Inf. Secur. Appl., (2021)Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics., , and . ICNCC, page 75-78. ACM, (2019)