Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption., , , , , , and . SP, page 3109-3127. IEEE, (2024)STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Collaborative ensemble learning under differential privacy., , , , and . Web Intell., 16 (1): 73-87 (2018)Flexible and Deployable Colon Support Structure for Endoluminal Interventions., , , , , , , , , and 2 other author(s). IEEE Access, (2021)A Novel Robotic Suturing System for Flexible Endoscopic Surgery., , , , , and . ICRA, page 1514-1520. IEEE, (2019)StopGuess: A framework for public-key authenticated encryption with keyword search., , , , , and . Comput. Stand. Interfaces, (March 2024)Bilateral-secure Signature by Key Evolving., , , and . AsiaCCS, page 523-533. ACM, (2016)Secure Data Transmission with Access Control for Smart Home Devices., , , and . TrustCom, page 258-265. IEEE, (2021)SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on Integers., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Efficient biometric identity-based encryption., , , and . Inf. Sci., (2018)