Author of the publication

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.

, , , , and . Int. J. Sens. Networks, 24 (1): 62-73 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks., , , and . KSII Trans. Internet Inf. Syst., 11 (7): 3629-3647 (2017)Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service., , and . KSII Trans. Internet Inf. Syst., 13 (3): 1523-1545 (2019)Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage., , and . IEEE Syst. J., 15 (1): 577-585 (2021)Rethinking Semantic Image Compression: Scalable Representation With Cross-Modality Transfer., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (8): 4441-4445 (August 2023)Certificate-based signcryption with enhanced security features., , , and . Comput. Math. Appl., 64 (6): 1587-1601 (2012)Remote Data Checking With a Designated Verifier in Cloud Storage., , and . IEEE Syst. J., 14 (2): 1788-1797 (2020)Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy., , , , and . IEEE Syst. J., 16 (3): 4804-4815 (2022)Threshold Certificate-based Encryption., , and . J. Softw., 4 (3): 210-217 (2009)Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage., , , , , and . IEEE Access, (2020)Certificate-Based Signcryption: Security Model and Efficient Construction., and . IACR Cryptol. ePrint Arch., (2011)