Author of the publication

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.

, , , , , and . Comput. J., 59 (7): 970-982 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of linear dynamic systems operating in a networked environment., , and . Automatica, 45 (12): 2763-2772 (2009)Fuzzy conditional proxy re-encryption., , , and . SCIENCE CHINA Information Sciences, 56 (5): 1-13 (2013)Identification of FIR Systems Based on Quantized Output Measurements: A Quadratic Programming-Based Method., and . IEEE Trans. Automat. Contr., 60 (5): 1439-1444 (2015)Hierarchical conditional proxy re-encryption., , , and . Computer Standards & Interfaces, 34 (4): 380-389 (2012)An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR., , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 536-549. Springer, (2015)Regularization Path for ν-Support Vector Classification., , , and . IEEE Trans. Neural Netw. Learning Syst., 23 (5): 800-811 (2012)A sock puppet detection algorithm on virtual spaces., , and . Knowl.-Based Syst., (2013)A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning., , and . FSKD (3), page 331-335. IEEE Computer Society, (2008)978-0-7695-3305-6.An Embedded Load Balancing System for High Speed OC192 Networks., , , , and . ICESS, page 587-592. IEEE Computer Society, (2009)SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System., , and . CSCWD, page 573-576. IEEE, (2007)