Author of the publication

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.

, , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , and . Hum. centric Comput. Inf. Sci., (2015)OFF-ApexNet on Micro-expression Recognition System., , , , and . CoRR, (2018)A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms., , , and . IEEE Access, (2020)Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128., , , and . J. Cryptogr. Eng., 13 (3): 265-281 (September 2023)Learning Age From Gait: A Survey., , , , and . IEEE Access, (2021)OFF-ApexNet on micro-expression recognition system., , , , and . Signal Process. Image Commun., (2019)Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes., , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 100-105. Springer, (2008)Proxy Re-encryption with Keyword Search: New Definitions and Algorithms., , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester., , , and . Int. J. Comput. Math., 90 (12): 2581-2587 (2013)TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain., , and . IEEE Access, (2021)