Author of the publication

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.

, , , , , and . IEEE Trans. Information Forensics and Security, 12 (3): 676-688 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless threshold signature scheme from bilinear maps., , , , , and . Inf. Sci., 180 (23): 4714-4728 (2010)Quantum private set intersection cardinality and its application to anonymous authentication., , , , and . Inf. Sci., (2016)Certificateless Threshold Ring Signature., , , and . Inf. Sci., 179 (20): 3685-3696 (2009)Trust-oriented QoS-aware composite service selection based on genetic algorithms., , and . Concurrency and Computation: Practice and Experience, 26 (2): 500-515 (2014)Private Keyword-Search for Database Systems Against Insider Attacks., , , and . J. Comput. Sci. Technol., 32 (3): 599-617 (2017)Continuous leakage-resilient access control for wireless sensor networks., , , and . Ad Hoc Networks, (2018)An efficient dynamic authenticated key exchange protocol with selectable identities., , , , , and . Computers & Mathematics with Applications, 61 (9): 2518-2527 (2011)Efficient and secure stored-value cards with leakage resilience., , and . Computers & Electrical Engineering, 38 (2): 370-380 (2012)Nominative Signature: Application, Security Model and Construction., , , , , , and . IACR Cryptology ePrint Archive, (2007)PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption., , , , and . IACR Cryptology ePrint Archive, (2014)