Author of the publication

A remote sensing encrypted data search method based on a novel double-chain.

, , , and . Connect. Sci., (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme., , , , and . Entropy, 25 (5): 822 (2023)Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 519-527. Springer, (2018)Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices., , , , and . Adv. Comput., (2021)A remote sensing encrypted data search method based on a novel double-chain., , , and . Connect. Sci., (December 2023)Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing., , and . Secur. Commun. Networks, (2020)Dynamic forward secure searchable encryption scheme with phrase search for smart healthcare., , , , and . J. Syst. Archit., (November 2023)Identifying top Chinese network buzzwords from social media big data set based on time-distribution features., , , and . IEEE BigData, page 924-931. IEEE Computer Society, (2014)Efficient lattice-based traceable ring signature scheme with its application in blockchain., , , and . Inf. Sci., (November 2023)An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain., , , , , and . Secur. Commun. Networks, (2022)Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network., , , and . Connect. Sci., 34 (1): 511-528 (2022)