From post

A Revocable Outsourcing Attribute-Based Encryption Scheme.

, , , , , , и . CloudComp, том 197 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 145-161. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Revocable Outsourcing Attribute-Based Encryption Scheme., , , , , , и . CloudComp, том 197 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 145-161. Springer, (2016)SOAPTyping: an open-source and cross-platform tool for sequence-based typing for HLA class I and II alleles., , , , , , , , , и 5 other автор(ы). BMC Bioinform., 21 (1): 295 (2020)Secure HARQ-IR-Aided Terahertz Communications., , , , , , и . ICCC Workshops, стр. 1-6. IEEE, (2023)Privacy-Preserving Distributed Machine Learning Made Faster., , , , , , , и . SecTL@AsiaCCS, стр. 2:1-2:14. ACM, (2023)Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework., , , , и . ACISP (2), том 9723 из Lecture Notes in Computer Science, стр. 333-346. Springer, (2016)Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT., , , , , и . NSS, том 11058 из Lecture Notes in Computer Science, стр. 484-490. Springer, (2018)How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?, , , и . ISAAC, том 248 из LIPIcs, стр. 26:1-26:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing., , , , , , , , и . ICA3PP (4), том 11337 из Lecture Notes in Computer Science, стр. 447-460. Springer, (2018)A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match., , , , и . DSC, стр. 480-486. IEEE, (2019)MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle., , , , , , , , , и 1 other автор(ы). TrustCom, стр. 1020-1027. IEEE, (2022)