From post

Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.

, и . SecureComm, том 462 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 272-289. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent., , , и . ICMLC, том 3930 из Lecture Notes in Computer Science, стр. 70-80. Springer, (2005)Block verifiable dynamic searchable encryption using redactable blockchain., , , и . J. Inf. Secur. Appl., (июня 2023)Quantum Network Coding Based on Quantum Steering., , , , , и . WCSP, стр. 171-176. IEEE, (2023)CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering., , , и . TrustCom, стр. 823-832. IEEE, (2023)Dynamic Trust Model Based on Perceived Risk., , и . ICEE, стр. 2037-2040. IEEE Computer Society, (2010)Multiuser physical layer security mechanism in the wireless communication system of the IIOT., и . Comput. Secur., (2022)Enabling efficient and verifiable secure search on cloud-based encrypted big data., , и . Peer Peer Netw. Appl., 16 (5): 2574-2590 (сентября 2023)A lightweight heterogeneous network clustering algorithm based on edge computing for 5G., , , и . Wireless Networks, 26 (3): 1631-1641 (2020)Multiattribute Evaluation Model Based on the KSP Algorithm for Edge Computing., , и . IEEE Access, (2020)Subjective Trust Evaluation Model Based on Preferences., и . CSEE (2), том 215 из Communications in Computer and Information Science, стр. 466-472. Springer, (2011)