Author of the publication

Provably secure and efficient bounded ciphertext policy attribute based encryption.

, , , and . AsiaCCS, page 343-352. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The augmented reality research progress in collaboration environment of CAR-CA., , , , and . VRCAI, page 229-236. ACM, (2010)A multiresolution object space point-based rendering approach for mobile devices., and . Afrigraph, page 7-13. ACM, (2007)Flexible editing of style, identity and content of human motion., , , and . SI3D, page 202. ACM, (2011)Multi-Scale Dual-Branch Fully Convolutional Network for Hand Parsing., , and . CoRR, (2019)Single Depth Map Super-resolution with Local Self-similarity., , and . ICVIP, page 198-202. ACM, (2018)Demo: Wanda, Securely Introducing Mobile Devices., , , and . MobiSys (Companion Volume), page 113. ACM, (2016)Light Space Cascaded Shadow Maps for Large Scale Dynamic Environments., , , and . MIG, volume 5884 of Lecture Notes in Computer Science, page 243-255. Springer, (2009)Adaptive Mechanisms of Organizational Structures in Multi-agent Systems., , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 471-477. Springer, (2006)EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection., , and . ICC, page 1-6. IEEE, (2018)HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks., , , , and . Comput. Commun., 35 (15): 1910-1920 (2012)