Author of the publication

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation.

, , , , and . J. Ambient Intell. Humaniz. Comput., 10 (2): 429-438 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Customer-oriented sales modeling strategy in a big data environment., , and . Concurr. Comput. Pract. Exp., (2021)On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing., and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 405-413. Springer, (2016)Yet Another Way to Construct Digital Signature in the Standard Model., and . INCoS, page 430-433. IEEE, (2013)An Improved Data Integrity Verification Scheme for Cloud Storage., , , , , and . INCoS, volume 182 of Lecture Notes on Data Engineering and Communications Technologies, page 393-401. Springer, (2023)On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme., and . INCoS, page 571-576. IEEE, (2012)Improved publicly verifiable auditing protocol for cloud storage., , , , , and . Concurr. Comput. Pract. Exp., (2021)Data Owner Based Attribute Based Encryption., , and . INCoS, page 144-148. IEEE, (2015)Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes., , and . NaNA, page 278-281. IEEE, (2021)Differential privacy distributed learning under chaotic quantum particle swarm optimization., , , and . Computing, 103 (3): 449-472 (2021)Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation., , , , and . J. Ambient Intell. Humaniz. Comput., 10 (2): 429-438 (2019)