Author of the publication

Blockchain-Based Anti-Key-Leakage Key Aggregation Searchable Encryption for IoT.

, , , and . IEEE Internet Things J., 7 (2): 1502-1518 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak., , , , and . Quantum Inf. Comput., 23 (3&4): 223-234 (2023)Continuous Control With Swarm Intelligence Based Value Function Approximation., , , , , and . IEEE Trans Autom. Sci. Eng., 21 (1): 976-988 (January 2024)Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting., , , , and . Quantum Inf. Process., 22 (6): 228 (2023)Embedded Representation of Relation Words with Visual Supervision., , , , and . IRC, page 409-412. IEEE, (2019)Anonymous Fair Exchange Protocol with a Semitrusted Third Party., , , and . DSC, page 431-440. IEEE Computer Society, (2017)Research on Countermeasures and Simulation of R32 Tank Leakage Accident Based on TNO Multienergy Model., and . BDEIM, page 175-180. ACM, (2023)Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model., , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 342-357. Springer, (2022)A Novel Digital Rights Management in P2P Networks Based on Bitcoin System., , , and . FCS, volume 879 of Communications in Computer and Information Science, page 227-240. Springer, (2018)Disease Diagnosis with Cost-Sensitive Grouped Features Based on Deep Reinforcement Learning., , and . IJCNN, page 1-7. IEEE, (2023)On the value distributions of Walsh spectrums of quadratic Plateaued functions., , and . Comput. Electr. Eng., 37 (6): 849-857 (2011)