Author of the publication

PRAM: privacy preserving access management scheme in cloud services.

, , , , , and . SCC@ASIACCS, page 41-46. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis on Variation and Factors of Water Resources Consumption Intensity in China., , and . Modeling Risk Management for Resources and Environment in China, Springer, (2011)Safeness-Based Community Penetration., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 68 (7): 2690-2694 (2021)Efficient and Identity-based Signcryption with Provably-secure., , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (3): 826-829 (2006)AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud., , , , and . Comput. Informatics, 37 (2): 291-310 (2018)Electrocardiogram Based Group Device Pairing for Wearables., , , , , and . IEEE Trans. Mob. Comput., 22 (11): 6394-6409 (November 2023)MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting., , , , , , and . IEEE Trans. Serv. Comput., 16 (2): 1282-1295 (March 2023)Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation., , , , , and . IEEE Trans. Serv. Comput., 16 (6): 3999-4011 (November 2023)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (May 2023)Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment., , , , , and . Comput. Networks, (2022)