Author of the publication

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.

, , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 608-619 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Public Verifiability and Data Dynamics for Storage Security., , , , and . IACR Cryptology ePrint Archive, (2009)Multipodal Structure and Phase Transitions in Large Constrained Graphs., , , and . CoRR, (2014)Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming., , and . IEEE Trans. Computers, 65 (1): 216-229 (2016)Towards Privacy-Preserving Malware Detection Systems for Android., , , , and . ICPADS, page 545-552. IEEE, (2018)Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations., , , and . IEEE Trans. Parallel Distributed Syst., 24 (6): 1172-1181 (2013)Inverse transport calculations in optical imaging with subspace optimization algorithms., and . J. Comput. Phys., (2014)Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks., , and . IEEE Trans. Wirel. Commun., 7 (1): 354-363 (2008)Blind Recognition of Touched Keys on Mobile Devices., , , , , and . ACM Conference on Computer and Communications Security, page 1403-1414. ACM, (2014)Attribute-based fine-grained access control with efficient revocation in cloud storage systems., , and . AsiaCCS, page 523-528. ACM, (2013)A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses., , , , , , , and . IEEE Commun. Surv. Tutorials, 24 (4): 2292-2328 (2022)