Author of the publication

Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation.

, , , , , and . IEEE Trans. Serv. Comput., 16 (6): 3999-4011 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing., , , , , and . ACM Trans. Internet Techn., 22 (2): 45:1-45:24 (2022)ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks., , , , and . Future Gener. Comput. Syst., (2018)Android Malware Detection Based on Call Graph via Graph Neural Network., , , , , and . NaNA, page 368-374. IEEE, (2020)Lightweight Security Authentication Mechanism Towards UAV Networks., , , , , , , and . NaNA, page 379-384. IEEE, (2019)Android Malware Detection via Graph Representation Learning., , , , , and . Mob. Inf. Syst., (2021)Indian Buffet Process-Based on Nonnegative Matrix Factorization with Single Binary Component., , , , and . SMC, page 1139-1144. IEEE, (2021)Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT., , , , , and . NaNA, page 348-354. IEEE, (2020)Lightweight Secure Communication Mechanism Towards UAV Networks., , , , , , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT., , , , , , and . AIiH (2), volume 14976 of Lecture Notes in Computer Science, page 263-278. Springer, (2024)Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)