Author of the publication

RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.

, , and . IEEE Trans. Serv. Comput., 15 (2): 1026-1035 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-lane totally asymmetric exclusion processes with particle creation and annihilation, , and . Physica A: Statistical Mechanics and its Applications, 375 (1): 247--256 (Feb 15, 2007)Advanced remote password authentication and key agreement using smart card., , and . CAINE, page 364-370. ISCA, (2006)The MicroArray Quality Control (MAQC)-II study of common practices for the development and validation of microarray-based predictive models., , , , , , , , , and 193 other author(s). Nat Biotechnol, 28 (8): 827--838 (August 2010)Maximum Likelihood Estimation for a Hidden Semi-Markov Model with Multivariate Observations., , and . Quality and Reliability Eng. Int., 28 (7): 783-791 (2012)Network operation reliability in a Manhattan-like urban system with adaptive traffic lights., , , , and . ITSC, page 1135-1141. IEEE, (2014)Role Playing Learning for Socially Concomitant Mobile Robot Navigation., , , and . CoRR, (2017)Integrative data analysis in systems biology., , and . International journal of computational biology and drug design, 4 (2): 107--110 (2011)Excluded Volume Effect in a Pedestrian Queue., , , , , , and . ACRI, volume 6350 of Lecture Notes in Computer Science, page 523-531. Springer, (2010)Residual life prediction for systems subject to condition monitoring., , and . CASE, page 106-111. IEEE, (2010)Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage., , and . ISCID (1), page 33-36. IEEE, (2017)