Author of the publication

Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure.

, , and . INCoS, page 46-50. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation., , , , and . INCoS, page 38-45. IEEE, (2013)Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure., , and . INCoS, page 46-50. IEEE, (2013)Dual-side privacy-preserving task matching for spatial crowdsourcing., , , , and . J. Network and Computer Applications, (2018)Efficient and secure big data storage system with leakage resilience in cloud computing., , , , , and . Soft Comput., 22 (23): 7763-7772 (2018)Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing., , , , , and . Security and Communication Networks, (2018)DABKE: Secure deniable attribute-based key exchange framework., , , , , , and . Journal of Computer Security, 27 (2): 259-275 (2019)OR-Tree: An Optimized Spatial Tree Index for Flash-Memory Storage Systems., , , , and . ICDKE, volume 7696 of Lecture Notes in Computer Science, page 1-14. Springer, (2012)Anonymous attribute-based proxy re-encryption for access control in cloud computing., , , and . Security and Communication Networks, 9 (14): 2397-2411 (2016)Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts., , , , and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 259-273. Springer, (2014)Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing., and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 807-814. Springer, (2016)