Author of the publication

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.

, , , , and . TrustCom/BigDataSE/ISPA (1), page 459-466. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation., , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)Time obfuscation-based privacy-preserving scheme for location-based services., , , , and . WCNC, page 1-6. IEEE, (2016)Protection of location privacy in continuous LBSs against adversaries with background information., , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)A practical group matching scheme for privacy-aware users in mobile social networks., , , , , and . WCNC, page 1-6. IEEE, (2016)Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach., , , , , and . ICCS (1), volume 11536 of Lecture Notes in Computer Science, page 590-603. Springer, (2019)Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game., , , , and . ICA3PP, volume 10393 of Lecture Notes in Computer Science, page 313-327. Springer, (2017)Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System., , , , , and . ICCCN, page 1-9. IEEE, (2018)A User-Based Document Management Mechanism in Cloud., , , , and . CIS, page 377-381. IEEE Computer Society, (2014)Design of Multi Cipher Processing Architecture for Random Cross Access., , , and . Microprocessors and Microsystems - Embedded Hardware Design, (2018)Privacy Computing: Concept, Computing Framework And Future Development Trends., , , and . IACR Cryptology ePrint Archive, (2018)