Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-Based Oblivious Access Control., , , and . Comput. J., 55 (10): 1202-1215 (2012)Identity-based data storage in cloud computing., , and . Future Generation Comp. Syst., 29 (3): 673-681 (2013)Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)., , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 566-575. Springer, (2017)PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption., , , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 73-90. Springer, (2014)Enhancing the security of FinTech applications with map-based graphical password authentication., , , , and . Future Generation Comp. Syst., (2019)AAC-OT: Accountable Oblivious Transfer With Access Control., , , , and . IEEE Trans. Information Forensics and Security, 10 (12): 2502-2514 (2015)Fine-grained information flow control using attributes., , , , , and . Inf. Sci., (2019)KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage., , , and . IEEE Trans. Services Computing, 10 (5): 715-725 (2017)When Intrusion Detection Meets Blockchain Technology: A Review., , , , and . IEEE Access, (2018)User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption., , , , , and . IEEE Trans. Computers, 65 (9): 2939-2946 (2016)