Author of the publication

A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices.

, , , and . Future Gener. Comput. Syst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Degree-Constrained Adaptive Algorithm Based on the Data Aggregation Tree., , , and . IJDSN, (2014)A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices., , , and . Future Gener. Comput. Syst., (2021)An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping., , and . CSSE (3), page 116-120. IEEE Computer Society, (2008)978-0-7695-3336-0.Adaptive Contention Window MAC Protocol in a Global View for Emerging Trends Networks., , , and . IEEE Access, (2021)Bab: A novel algorithm for training clean model based on poisoned data., , , , and . SafeAI@AAAI, volume 3381 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment., , , and . SpaCCS Workshops, volume 12383 of Lecture Notes in Computer Science, page 357-371. Springer, (2020)The Design and Challenges of Online Reprogramming System for Wireless Sensor Networks., and . J. Digit. Inf. Manag., 9 (6): 255-260 (2011)A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms., , , , and . SpaCCS Workshops, volume 12383 of Lecture Notes in Computer Science, page 222-232. Springer, (2020)Identity-Based Conditional Proxy Re-Encryption., , , and . ICC, page 1-5. IEEE, (2011)CCA-secure ABE with outsourced decryption for fog computing., , , , and . Future Gener. Comput. Syst., (2018)