Author of the publication

Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.

, and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 272-289. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent., , , and . ICMLC, volume 3930 of Lecture Notes in Computer Science, page 70-80. Springer, (2005)Quantum Network Coding Based on Quantum Steering., , , , , and . WCSP, page 171-176. IEEE, (2023)CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering., , , and . TrustCom, page 823-832. IEEE, (2023)Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration., , , and . Mob. Networks Appl., 27 (1): 431-440 (2022)Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks., , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 567-578. Springer, (2022)A Multi-label Privacy-Preserving Image Retrieval Scheme Based on Object Detection for Efficient and Secure Cloud Retrieval., , and . CGI (1), volume 14495 of Lecture Notes in Computer Science, page 43-55. Springer, (2023)A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof., , and . ICA3PP (2), volume 13156 of Lecture Notes in Computer Science, page 647-664. Springer, (2021)Lightweight Searchable Encryption with Small Clients on Edge Cloud., , and . AsiaJCIS, page 41-48. IEEE, (2022)A Highly Accurate Statistical Attack against Searchable Symmetric Encryption., , and . ICPADS, page 2823-2826. IEEE, (2023)Subjective Trust Evaluation Model Based on Preferences., and . CSEE (2), volume 215 of Communications in Computer and Information Science, page 466-472. Springer, (2011)