Author of the publication

A Revocable Outsourcing Attribute-Based Encryption Scheme.

, , , , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-161. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption., , , , , , , and . ICDIS, page 127-133. IEEE, (2022)EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling., , , , , , and . SPAC, page 118-123. IEEE, (2017)White-box traceable dynamic attribute based encryption., , , , and . SPAC, page 526-530. IEEE, (2017)Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator., , , , , and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 274-289. Springer, (2014)Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage., , , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 153-169. Springer, (2016)Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability., , , and . Security and Management, page 307-313. CSREA Press, (2009)Attribute-based queries over outsourced encrypted database., , , and . SPAC, page 164-168. IEEE, (2017)Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration., , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 525-538. Springer, (2017)A Revocable Outsourcing Attribute-Based Encryption Scheme., , , , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-161. Springer, (2016)Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments., , , , , , and . Neural Comput. Appl., 35 (22): 16193-16222 (August 2023)