Author of the publication

Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.

, , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 94-105 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inland Lakes Mapping for Monitoring Water Quality Using a Detail/Smoothing-Balanced Conditional Random Field Based on Landsat-8/Levels Data., , , , , , , and . Sensors, 20 (5): 1345 (2020)Water Quality Grade Identification for Lakes in Middle Reaches of Yangtze River Using Landsat-8 Data with Deep Neural Networks (DNN) Model., , , , , , , and . Remote. Sens., 14 (24): 6238 (December 2022)Traceable and revocable CP-ABE with shorter ciphertexts., , , and . Sci. China Inf. Sci., 59 (11): 119102:1-119102:3 (2016)Multiple Feature Fusion for Fine Classification of Crops in UAV Hyperspectral Imagery., , and . IGARSS, page 5059-5062. IEEE, (2021)Inland Waters Suspended Solids Concentration Retrieval Based on PSO-LSSVM for UAV-Borne Hyperspectral Remote Sensing Imagery., , , , , and . Remote. Sens., 11 (12): 1455 (2019)Tailings Reservoir Disaster and Environmental Monitoring Using the UAV-ground Hyperspectral Joint Observation and Processing: A Case of Study in Xinjiang, the Belt and Road., , , , , and . IGARSS, page 9713-9716. IEEE, (2019)MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks., , , and . ADHOC-NOW, volume 6811 of Lecture Notes in Computer Science, page 177-190. Springer, (2011)Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices., , and . AISNS, page 283-290. ACM, (2023)Monitoring of Urban Black-Odor Water Based on Nemerow Index and Gradient Boosting Decision Tree Regression Using UAV-Borne Hyperspectral Imagery., , , , , and . Remote. Sens., 11 (20): 2402 (2019)Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 94-105 (2018)