Author of the publication

Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.

, , , and . Theor. Comput. Sci., (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing., , , , and . IEEE Access, (2019)A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch., , , , and . Sensors, 19 (9): 2109 (2019)Geometric Searchable Encryption for Privacy-Preserving Location-Based Services., , , , and . IEEE Trans. Serv. Comput., 16 (4): 2672-2684 (July 2023)Y-DWMS: A Digital Watermark Management System Based on Smart Contracts., , , , , , and . Sensors, 19 (14): 3091 (2019)CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts., , , , , , , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 449-468. Springer, (2022)Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention., , , , , , and . CoRR, (2023)Geometric Searchable Encryption Without False Positive And Its Applications., , , , and . Comput. J., 66 (9): 2155-2168 (September 2023)Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment., , , and . Mob. Networks Appl., 26 (4): 1609-1615 (2021)A Privacy-Preserving Data Feed Scheme for Smart Contracts., , , , and . IEICE Trans. Inf. Syst., 105-D (2): 195-204 (2022)A privacy preserve big data analysis system for wearable wireless sensor network., , , , , and . Comput. Secur., (2020)