Author of the publication

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.

, , , , , and . Soft Comput., 22 (3): 707-714 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Star-Topological Privacy Encryption for Telecare Medical Information Systems., , and . INCoS, page 311-317. IEEE, (2016)PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs., , , , , and . Int. J. Intell. Syst., 37 (2): 1204-1221 (2022)Generating facial expression adversarial examples based on saliency map., , , , and . Image Vis. Comput., (2021)Research on watermarking payload under the condition of keeping JPEG image transparency., , , , , , and . Multim. Tools Appl., 76 (6): 8423-8448 (2017)Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption., , , , , and . Soft Comput., 22 (3): 707-714 (2018)Searching for optimal quantum secret sharing scheme based on local distinguishability., , , , , and . Quantum Inf. Process., 19 (10): 368 (2020)Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2241-2254 (2016)Classify the Majority of the Total Bytes on the Internet., , , and . ISIP, page 68-72. IEEE Computer Society, (2008)Secure and Flexible Digital Rights Management in a Pervasive Usage Mode., , and . CIS, page 863-867. IEEE Computer Society, (2007)Improved Remote User Authentication Scheme Preserving User Anonymity., , and . CNSR, page 323-328. IEEE Computer Society, (2007)