Author of the publication

Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption.

, , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving and Secure Sharing of PHR in the Cloud., , , and . J. Medical Systems, 40 (12): 267:1-267:13 (2016)CP-ABE With Constant-Size Keys for Lightweight Devices., , , , and . IEEE Trans. Information Forensics and Security, 9 (5): 763-771 (2014)Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation., , , , , and . IEEE Trans. Information Forensics and Security, 12 (3): 676-688 (2017)Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs., , and . IEEE Trans. Information Forensics and Security, 9 (1): 5-13 (2014)Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption., , and . IEEE Trans. Information Forensics and Security, 11 (2): 247-257 (2016)Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud., , , and . IEEE Trans. Information Forensics and Security, 13 (8): 2101-2113 (2018)BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication., , , and . IEEE Trans. Information Forensics and Security, 10 (12): 2643-2652 (2015)Vulnerabilities of an ECC-based RFID authentication scheme., , , , and . Security and Communication Networks, 8 (17): 3262-3270 (2015)Loss-tolerant authentication with digital signatures., , and . Security and Communication Networks, 7 (11): 2054-2062 (2014)Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing., , , and . Future Generation Comp. Syst., (2018)