Author of the publication

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.

, , , , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A joint energy-saving mechanism for M2M communications in LTE-based system., , and . WCNC, page 4706-4711. IEEE, (2013)An Optimized Random Access Algorithm for MTC Users over Wireless Networks., , , and . VTC Spring, page 1-5. IEEE, (2013)Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials., and . Future Gener. Comput. Syst., (2014)Understanding the continuance use of social network sites: a computer self-efficacy perspective., , and . Behav. Inf. Technol., 34 (2): 204-216 (2015)The Moderating Effects of Utilitarian and Hedonic Values on Information Technology Continuance., , and . ACM Trans. Comput. Hum. Interact., 19 (2): 12:1-12:26 (2012)A fine-grained attribute-based authentication for sensitive data stored in cloud computing., , and . Int. J. Grid Util. Comput., 7 (4): 237-244 (2016)Intelligent Building System for 3D Construction of Complex Brick Models., , , , and . IEEE Access, (2020)Server-Aided Verification Signature with Privacy for Mobile Computing., , , and . Mob. Inf. Syst., (2015)Proxy Signature Scheme Based on Isomorphisms of Polynomials., and . NSS, volume 7645 of Lecture Notes in Computer Science, page 113-125. Springer, (2012)An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure., , , and . J. Univers. Comput. Sci., 21 (3): 454-472 (2015)