Author of the publication

Privacy-Preserving and Secure Sharing of PHR in the Cloud.

, , , and . J. Medical Systems, 40 (12): 267:1-267:13 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerating cogent confabulation: An exploration in the architecture design space., , , , , and . IJCNN, page 1292-1300. IEEE, (2008)Research on Hardware-in-the-Loop Simulation for Advanced Front-Lighting System., , , and . PACIIA (2), page 671-675. IEEE Computer Society, (2008)978-0-7695-3490-9.Hybrid Architecture for Accelerating DNA Codeword Library Searching., , , and . CIBCB, page 323-330. IEEE, (2007)New Constructions of Identity-based Broadcast Encryption without Random Oracles., , and . TIIS, 5 (2): 428-439 (2011)Identity-based Threshold Broadcast Encryption in the Standard Model., , and . TIIS, 4 (3): 400-410 (2010)A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heterogeneous High-Performance Computing Cluster., , , , and . IEEE Trans. Computers, 62 (5): 886-899 (2013)High-Performance Computing on the Intel® Xeon Phi™ - How to Fully Exploit MIC Architectures, , , , , , and . Springer, (2014)New Efficient Hierarchical Identity-based Signature., and . JCP, 8 (3): 803-810 (2013)Traffic Jam Detection Based on Corner Feature of Background Scene In Video-Based ITS., , , , and . ICNSC, page 614-619. IEEE, (2008)Secure Identity-based Threshold Broadcast Encryption in the Standard Model., , and . JNW, 6 (11): 1602-1609 (2011)