Author of the publication

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.

, , , , and . Theor. Comput. Sci., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymity Control in Multi-bank E-Cash System., and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 104-116. Springer, (2000)Resistance of S-Boxes against Algebraic Attacks., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)Efficient ID-based Group Key Agreement with Bilinear Maps., , and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 130-144. Springer, (2004)Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 329-331 (2009)Balancing Personal Privacy and Public Safety in COVID-19: Case of Korea and France., , , and . CoRR, (2020)A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (9): 1620-1631 (2010)Secure and Efficient Key Management for Dynamic Multicast Groups., and . ACM SIGOPS Oper. Syst. Rev., 35 (4): 32-38 (2001)Verification of the performance of respiratory synchronisation radiation switchgear by using imaging technique., , , and . Int. J. Adv. Media Commun., 6 (1): 93-101 (2016)How to Securely Record Logs based on ARM TrustZone., , , and . AsiaCCS, page 664-666. ACM, (2019)Client cloud Web service: reducing traffic consumption., , , and . Secur. Commun. Networks, 9 (3): 248-261 (2016)