Author of the publication

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.

, , , , and . Inf. Sci., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dependable Cluster Based Topology in P2P Networks., , , and . JCM, 5 (1): 57-62 (2010)SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks., , , , , and . Concurrency and Computation: Practice and Experience, 27 (10): 2668-2680 (2015)A mobile cache model with semantic locality., , and . IJIIDS, 1 (2): 216-227 (2007)MASSIVE: A Multidisciplinary Applications-Oriented Simulation and Visualization Environment., , , , , and . IEEE SCC, page 583-587. IEEE Computer Society, (2004)Research and Design of Multimedia NSS for E-Commerce., and . I3E (1), volume 251 of IFIP Advances in Information and Communication Technology, page 126-133. Springer, (2007)Detecting stepping stones by abnormal causality probability., , , , , and . Security and Communication Networks, 8 (10): 1831-1844 (2015)Minimizing Nested Interrupts of Secondary Users in Multi-Priority Cognitive Radio Networks., , , and . IDCS, volume 8223 of Lecture Notes in Computer Science, page 16-29. Springer, (2013)Identity-Based Conditional Proxy Re-Encryption., , , and . ICC, page 1-5. IEEE, (2011)Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption., , , , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 552-566. Springer, (2019)Scheduling Position-Based deteriorating jobs with Multiple rate-Modifying Activities and Past-sequence-dependent Delivery times., , , and . APJOR, (2014)