Author of the publication

Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control.

, , , , and . CGC, page 180-186. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust AM-MIMO based on minimized transmission power., , and . IEEE Communications Letters, 10 (6): 432-434 (2006)Dynamic Streamization Model Execution for SIMD Engines on Multicore Architectures., , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 32 (11): 1814-1818 (2013)A Hardware Approach for Reducing Interpretation Overhead., , , , , and . CIT (1), page 98-103. IEEE Computer Society, (2009)A semantic web service composition dynamic detecting method., , , , , and . ICDIM, page 326-330. IEEE, (2012)A runtime fault-tolerant routing algorithm based on region flooding in NoCs., , and . Microprocessors and Microsystems - Embedded Hardware Design, (2016)Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection., , , , , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 516-529. Springer, (2017)Protect Data Stored on Remote Server., , , , and . PDPTA, page 929-938. CSREA Press, (2004)Adaptive memory-side last-level GPU caching., , , , , and . ISCA, page 411-423. ACM, (2019)Intrusion Alert Analysis Based on PCA and the LVQ Neural Network., , and . ICONIP (3), volume 4234 of Lecture Notes in Computer Science, page 217-224. Springer, (2006)Transient Fault Tolerant QDI Interconnects Using Redundant Check Code., , , , and . DSD, page 3-10. IEEE Computer Society, (2013)