Author of the publication

Interactive conditional proxy re-encryption with fine grain policy.

, , , and . Journal of Systems and Software, 84 (12): 2293-2302 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fang, Liming
add a person with the name Fang, Liming
 

Other publications of authors with the same name

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage., , , and . IIH-MSP, page 795-798. IEEE, (2014)Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes., , , , and . JDCTA, 4 (9): 151-160 (2010)A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 248-258. Springer, (2009)Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model., , , , , and . IEEE Trans. Information Forensics and Security, 12 (6): 1382-1392 (2017)A Secure Multimedia Data Sharing Scheme for Wireless Network., , , and . Security and Communication Networks, (2018)12Gbps SerDes Jitter Tolerance BIST in production loopback testing with enhanced spread spectrum clock generation circuit., , , , and . ITC, page 1-8. IEEE Computer Society, (2013)Improved unidirectional chosen-ciphertext secure proxy re-encryption., , , , and . WCNIS, page 476-480. IEEE, (2010)A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles., , , , , and . Comput. J., 59 (7): 970-982 (2016)A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security., , , and . INCoS, page 552-559. IEEE, (2013)Reliable access control for multi-authority in cloud storage., , , and . ICCST, page 113-116. IEEE, (2015)