Author of the publication

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.

, , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 389-405. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , , and . IEEE Internet of Things Journal, 6 (3): 4702-4710 (2019)Machine learning based privacy-preserving fair data trading in big data market., , , , and . Inf. Sci., (2019)Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies., , , , , , and . IEEE Netw., 33 (5): 111-117 (2019)Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual., , , , , and . AsiaCCS, page 859-871. ACM, (2021)Threshold Ring Signature Scheme from Cryptographic Group Action., , , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 207-227. Springer, (2023)Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy., , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 389-405. Springer, (2016)LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , and . CoRR, (2018)Improved dynamic remote data auditing protocol for smart city security., , , , , and . Pers. Ubiquitous Comput., 21 (5): 911-921 (2017)Efficient attribute-based encryption with attribute revocation for assured data deletion., , , , , and . Inf. Sci., (2019)Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage., , , , , and . IEEE Trans. Emerg. Top. Comput., 8 (2): 377-390 (2020)