Author of the publication

Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.

, and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 272-289. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT., , , and . Comput. Networks, (2024)CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering., , , and . TrustCom, page 823-832. IEEE, (2023)Privacy-Preserving Retrieval Scheme Over Medical Images Based on Vision Transformer., , , and . ICIC (8), volume 14869 of Lecture Notes in Computer Science, page 403-415. Springer, (2024)Quantum Network Coding Based on Quantum Steering., , , , , and . WCSP, page 171-176. IEEE, (2023)Deep reinforcement learning with dual-Q and Kolmogorov-Arnold Networks for computation offloading in Industrial IoT., , and . Comput. Networks, (2025)Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent., , , and . ICMLC, volume 3930 of Lecture Notes in Computer Science, page 70-80. Springer, (2005)Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries., , and . Mob. Networks Appl., 27 (1): 417-430 (2022)Verifiable Encrypted Image Retrieval With Reversible Data Hiding in Cloud Environment., , , and . IEEE Trans. Cloud Comput., 13 (1): 397-410 (January 2025)A Multi-label Privacy-Preserving Image Retrieval Scheme Based on Object Detection for Efficient and Secure Cloud Retrieval., , and . CGI (1), volume 14495 of Lecture Notes in Computer Science, page 43-55. Springer, (2023)Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks., , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 567-578. Springer, (2022)