Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation., , , , and . INCoS, page 38-45. IEEE, (2013)Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure., , and . INCoS, page 46-50. IEEE, (2013)Anonymous attribute-based proxy re-encryption for access control in cloud computing., , , and . Security and Communication Networks, 9 (14): 2397-2411 (2016)Efficient and secure big data storage system with leakage resilience in cloud computing., , , , , and . Soft Comput., 22 (23): 7763-7772 (2018)Dual-side privacy-preserving task matching for spatial crowdsourcing., , , , and . J. Network and Computer Applications, (2018)Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing., , , , , and . Security and Communication Networks, (2018)DABKE: Secure deniable attribute-based key exchange framework., , , , , , and . Journal of Computer Security, 27 (2): 259-275 (2019)OR-Tree: An Optimized Spatial Tree Index for Flash-Memory Storage Systems., , , , and . ICDKE, volume 7696 of Lecture Notes in Computer Science, page 1-14. Springer, (2012)Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts., , , , and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 259-273. Springer, (2014)Attribute-Based Encryption with Multi-keyword Search., , , , , and . DSC, page 172-177. IEEE Computer Society, (2017)