Author of the publication

Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.

, , , and . Theor. Comput. Sci., (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved unidirectional chosen-ciphertext secure proxy re-encryption., , , , and . WCNIS, page 476-480. IEEE, (2010)Identification of linear dynamic systems operating in a networked environment., , and . Automatica, 45 (12): 2763-2772 (2009)SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System., , and . CSCWD, page 573-576. IEEE, (2007)An Embedded Load Balancing System for High Speed OC192 Networks., , , , and . ICESS, page 587-592. IEEE Computer Society, (2009)A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles., , , , , and . Comput. J., 59 (7): 970-982 (2016)Hierarchical conditional proxy re-encryption., , , and . Computer Standards & Interfaces, 34 (4): 380-389 (2012)Identification of FIR Systems Based on Quantized Output Measurements: A Quadratic Programming-Based Method., and . IEEE Trans. Automat. Contr., 60 (5): 1439-1444 (2015)Fuzzy conditional proxy re-encryption., , , and . SCIENCE CHINA Information Sciences, 56 (5): 1-13 (2013)A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning., , and . FSKD (3), page 331-335. IEEE Computer Society, (2008)978-0-7695-3305-6.An efficient semi-supervised representatives feature selection algorithm based on information theory., , , and . Pattern Recognition, (2017)