Author of the publication

Provably secure and efficient bounded ciphertext policy attribute based encryption.

, , , and . AsiaCCS, page 343-352. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The augmented reality research progress in collaboration environment of CAR-CA., , , , and . VRCAI, page 229-236. ACM, (2010)Flexible editing of style, identity and content of human motion., , , and . SI3D, page 202. ACM, (2011)Single Depth Map Super-resolution with Local Self-similarity., , and . ICVIP, page 198-202. ACM, (2018)A multiresolution object space point-based rendering approach for mobile devices., and . Afrigraph, page 7-13. ACM, (2007)Light Space Cascaded Shadow Maps for Large Scale Dynamic Environments., , , and . MIG, volume 5884 of Lecture Notes in Computer Science, page 243-255. Springer, (2009)Adaptive Mechanisms of Organizational Structures in Multi-agent Systems., , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 471-477. Springer, (2006)EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection., , and . ICC, page 1-6. IEEE, (2018)Multi-Scale Dual-Branch Fully Convolutional Network for Hand Parsing., , and . CoRR, (2019)A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs., , , and . IEEE Trans. Intell. Transp. Syst., 13 (1): 127-139 (2012)Observer-based Sliding Mode Fault-Tolerant Control for Spacecraft Attitude System with Actuator Faults., , , and . CAA SAFEPROCESS, page 154-159. IEEE, (2019)