Author of the publication

Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing.

, , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 98-107. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Algorithms for Computing a Strong Rank-Revealing QR Factorization., and . SIAM J. Scientific Computing, 17 (4): 848-869 (1996)QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector., , , , and . J. Comput. Sci. Technol., 24 (2): 357-372 (2009)MENs: Multi-user Emergency Navigation System Using., , , and . Ad Hoc & Sensor Wireless Networks, 12 (1-2): 23-53 (2011)Primal-Dual Interior-Point Methods for Semidefinite Programming in Finite Precision.. SIAM Journal on Optimization, 10 (2): 462-502 (2000)Synthesis of Bias-Scalable CMOS Analog Computational Circuits Using Margin Propagation., and . IEEE Trans. on Circuits and Systems, 59-I (2): 243-254 (2012)Formal Specification and Code Generation of Programable Logic Controllers., , , and . ICECCS, page 102-109. IEEE Computer Society, (2009)Global minimization of rational functions and the nearest GCDs., , and . J. Global Optimization, 40 (4): 697-718 (2008)On Theoretical Upper Bounds for Routing Estimation., , , , , and . J. UCS, 11 (6): 916-925 (2005)A 100 pJ/bit, (32, 8) CMOS Analog Low-Density Parity-Check Decoder Based on Margin Propagation., and . J. Solid-State Circuits, 46 (6): 1433-1442 (2011)A big data approach to analyzing market volatility., , , , and . Algorithmic Finance, 2 (3-4): 241-267 (2013)