Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM., , , , and . IACR Cryptology ePrint Archive, (2008)An efficient method for meteorological nephogram recognition in cloud environment., , , , , and . EURASIP J. Wireless Comm. and Networking, (2019)A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds., , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 139-151. Springer, (2019)Full Security: Fuzzy Identity Based Encryption., and . IACR Cryptology ePrint Archive, (2008)Revocable Attribute-Based Encryption With Data Integrity in Clouds., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 2864-2872 (2022)Blockchain-Based Efficient Incentive Mechanism in Crowdsensing., , , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 120-132. Springer, (2022)Front-end Control Mechanism of Electronic Records., , , , , and . Comput. Syst. Sci. Eng., 39 (3): 337-349 (2021)Multi-function Quantum Cryptography Protocol Based on Bell State., , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 110-119. Springer, (2019)Corrigendum to Ä New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371., , , and . J. Inf. Secur. Appl., (2020)A Cluster Correlation power analysis against double blinding exponentiation., , , and . J. Inf. Secur. Appl., (2019)