Author of the publication

Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme.

, , and . Information, 6 (3): 481-493 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System., , and . IEEE Access, (2019)High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems., , , , and . IACR Cryptology ePrint Archive, (2006)Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme., , , , and . PQCrypto, volume 6061 of Lecture Notes in Computer Science, page 41-60. Springer, (2010)Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud., , , and . IEEE Access, (2019)A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus., , , , and . ICCSA (2), volume 5073 of Lecture Notes in Computer Science, page 1-13. Springer, (2008)Cryptanalysis of an improved MFE public key cryptosystem., , , and . IJSN, 7 (3): 174-180 (2012)Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem., , , and . I. J. Network Security, 18 (1): 158-164 (2016)The Trust Management Model of Trusted Software., , , and . IFITA (3), page 534-537. IEEE Computer Society, (2009)Cubic Unbalance Oil and Vinegar Signature Scheme., , , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 47-56. Springer, (2015)Breaking a New Instance of TTM Cryptosystems., , , , and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 210-225. (2006)