Author of the publication

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.

, , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents., , , and . Wireless Personal Communications, 56 (1): 73-83 (2011)High speed implementation of symmetric block cipher on GPU., , , and . ISPACS, page 102-107. IEEE, (2014)Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords., and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 226-238. (2006)Intrinsic two-dimensional local structures for micro-expression recognition., , , , and . ICASSP, page 1851-1855. IEEE, (2016)Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09., , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 172-184. Springer, (2011)On Integral Distinguishers of Rijndael Family of Ciphers., , and . Cryptologia, 36 (2): 104-118 (2012)Multi-layer authentication scheme for HEVC video based on embedded statistics., , , and . J. Vis. Commun. Image Represent., (2016)Emotion-specific AUs for micro-expression recognition., , and . Multim. Tools Appl., 83 (8): 22773-22810 (2024)Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification., , , , and . IEEE J. Biomed. Health Informatics, 18 (1): 56-66 (2014)CUDA-SSL: SSL/TLS accelerated by GPU., , , and . ICCST, page 1-6. IEEE, (2017)