Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fang, Liming
add a person with the name Fang, Liming
 

Other publications of authors with the same name

EPON protocol over coax (EPoC): overview and design issues from a MAC layer perspective?, , , , , , and . IEEE Communications Magazine, 51 (10): 144-153 (2013)Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage., , , and . IIH-MSP, page 779-782. IEEE, (2014)Decryptable Public Key Encryption with Keyword Search Schemes., , , and . JDCTA, 4 (9): 141-150 (2010)Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM., , , , and . IACR Cryptology ePrint Archive, (2008)Anonymous Conditional Proxy Re-encryption without Random Oracle., , and . ProvSec, volume 5848 of Lecture Notes in Computer Science, page 47-60. Springer, (2009)A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems., , , , and . IEEE Internet Things J., 9 (3): 1976-1984 (2022)HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM., , , , , , , and . Trans. Data Sci., 1 (4): 25:1-25:18 (2020)Fuzzy conditional proxy re-encryption., , , and . SCIENCE CHINA Information Sciences, 56 (5): 1-13 (2013)Hierarchical conditional proxy re-encryption., , , and . Computer Standards & Interfaces, 34 (4): 380-389 (2012)On downstream transmissions in EPON Protocol over Coax (EPoC): An analysis of Coax framing approaches and other relevant considerations., , , , , , and . Photonic Network Communications, 28 (2): 178-189 (2014)