Author of the publication

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.

, , , , , and . IET Inf. Secur., 8 (4): 217-223 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic reading system based on automatic alignment control for pointer meter., , , , and . IECON, page 3414-3418. IEEE, (2014)martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture., , , and . CCS, page 1496-1510. ACM, (2023)A PSO identification algorithm for temperature adaptive adjustment system., , and . IEEM, page 752-755. IEEE, (2015)Monitoring the meteorological drought in the middle reaches of Heihe River basin based on TRMM precipitation data., , , and . IGARSS, page 4313-4316. IEEE, (2016)Combination attack of android applications analysis scheme based on privacy leak., , , and . CCIS, page 62-66. IEEE, (2016)A unified metadata information management framework for digital city., , , and . IGARSS, page 4422-4424. IEEE, (2004)A Geospatial Information Portal for Emergency Management of Natural Disasters., , and . IGARSS (2), page 404-407. IEEE, (2009)Optimal image registration via efficient local stochastic search., , and . CompIMAGE, page 247-253. Taylor & Francis, (2006)Fast Rerouting Against Multi-Link Failures Without Topology Constraint., , and . IEEE/ACM Trans. Netw., 26 (1): 384-397 (2018)Optimized linear active disturbance rejection control for pneumatic servo systems via least squares support vector machine., , , and . Neurocomputing, (2017)