Author of the publication

An Associated Deletion Scheme for Multi-copy in Cloud Storage.

, , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 511-526. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database., , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 15-35. Springer, (2022)Some Notes on Password Authenticated Key Exchange Based on RSA., , and . CIS (2), page 580-583. IEEE Computer Society, (2009)978-0-7695-3931-7.IFVD: Design of Intelligent Fusion Framework for Vulnerability Data Based on Text Measures., , , , , and . ICCCN, page 1-6. IEEE, (2020)Elliptic Curve Scalar Multiplication Based on Fibonacci Number., and . INCoS, page 507-510. IEEE, (2013)A new revocable reputation evaluation system based on blockchain., , , , , and . IJHPCN, 14 (3): 385-396 (2019)A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain., , , , , , and . Comput. Stand. Interfaces, (2023)An Associated Deletion Scheme for Multi-copy in Cloud Storage., , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 511-526. Springer, (2018)Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication., , and . SocialSec, volume 1663 of Communications in Computer and Information Science, page 175-198. Springer, (2022)A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features., , , and . MobiSec, volume 1644 of Communications in Computer and Information Science, page 280-291. Springer, (2022)