Author of the publication

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.

, , , , and . Computer Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-Database Private Information Retrieval from Fully Homomorphic Encryption., , , and . IEEE Trans. Knowl. Data Eng., 25 (5): 1125-1134 (2013)Multi-level programming of memristor in nanocrossbar., , , , and . IEICE Electronic Express, 10 (5): 20130013 (2013)Hamming network circuits based on CMOS/memristor hybrid design., , , , and . IEICE Electronic Express, 10 (12): 20130404 (2013)A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments., , , and . Distributed and Parallel Databases, 8 (1): 85-117 (2000)Classification of Privacy-preserving Distributed Data Mining protocols., and . ICDIM, page 337-342. IEEE, (2011)Efficient convertible Limited Verifier Signatures., , , and . ISIT, page 230-234. IEEE, (2008)Agent-Mediated Internet Advertising., and . WECWIS, page 102-108. IEEE Computer Society, (2000)Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems., and . IEEE Trans. Vehicular Technology, 51 (6): 1313-1315 (2002)Security of Park-Lim key agreement schemes for VSAT satellite communications., , , , , and . IEEE Trans. Vehicular Technology, 52 (2): 465-468 (2003)Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service., , , , , and . Networking, page 1-9. IEEE, (2019)