Author of the publication

Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search.

, , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 356-367. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information., , , and . ICISSP, page 373-378. SciTePress, (2018)Mobility management in VANET., , and . WOCC, page 298-303. IEEE, (2013)Signature Scheme from Trapdoor Functions., , , , and . J. Internet Serv. Inf. Secur., 9 (2): 31-41 (2019)A lattice-based public key encryption scheme with delegated equality test., , , , and . Comput. Stand. Interfaces, (January 2024)Post-quantum secure group signature with verifier local revocation and backward unlinkability., , , , and . Comput. Stand. Interfaces, (March 2024)Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems., , , , , and . Future Gener. Comput. Syst., (August 2023)Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification., , , , and . Comput. J., 62 (8): 1166-1177 (2019)Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test., , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 448-467. Springer, (2018)Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search., , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 356-367. Springer, (2023)Sequence aware functional encryption and its application in searchable encryption., , , , and . J. Inf. Secur. Appl., (2017)