Author of the publication

Dual Access Control for Cloud-Based Data Storage and Sharing.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1036-1048 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based trapdoor mercurial commitments and applications., , , , and . Theor. Comput. Sci., 412 (39): 5498-5512 (2011)A Noise Study of the PSW Signature Family: Patching DRS with Uniform Distribution †., , and . Inf., 11 (3): 133 (2020)Identity-based conditional proxy re-encryption with fine grain policy., , , and . Comput. Stand. Interfaces, (2017)Post-quantum secure group signature with verifier local revocation and backward unlinkability., , , , and . Comput. Stand. Interfaces, (March 2024)DFE-IP: Delegatable functional encryption for inner product., , , , and . Inf. Sci., (November 2023)A Generic Scheme of plaintext-checkable database encryption., , and . Inf. Sci., (2018)Publicly Verifiable Databases With All Efficient Updating Operations., , , , , , and . IEEE Trans. Knowl. Data Eng., 33 (12): 3729-3740 (2021)Lattice-based Signcryption with Equality Test in Standard Model., , , , , and . CoRR, (2020)Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model., , , and . CoRR, (2020)A model-driven approach to reengineering processes in cloud computing., , , , , and . Inf. Softw. Technol., (2022)