Author of the publication

A RBAC Model Based on Multi-granularities of Time Constraints.

, , , , and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 538-549. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration., , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (10): 13661-13672 (October 2023)Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices., , , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 334-346. Springer, (2020)Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security., , , , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 332-345. Springer, (2021)A communal catalogue reveals Earth's multiscale microbial diversity, , , , , , , , , and 293 other author(s). Nature, (Nov 1, 2017)A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 417-427. Springer, (2020)Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network., , , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 47-56. Springer, (2019)Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease., , , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 120-140. Springer, (2019)Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation., , , , and . FCS, volume 1105 of Communications in Computer and Information Science, page 107-127. Springer, (2019)Identification of NAND flash ECC algorithms in mobile devices., , and . Digit. Investig., 9 (1): 34-48 (2012)A RBAC Model Based on Multi-granularities of Time Constraints., , , , and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 538-549. Springer, (2011)