Author of the publication

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.

, , , , and . CSE/EUC (1), page 556-561. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Affine SoftAssign with bidirectional distance for point matching., , , , and . ICIP, page 1267-1271. IEEE, (2013)Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security., , , , , and . DSC, page 100-105. IEEE, (2019)A Novel Nonlinear Control Scheme for Double-Pendulum Quadrotor Transportation Systems., , , , , and . AIM, page 714-719. IEEE, (2019)Optimization control of a fed-batch process using an improved reinforcement learning algorithm., , , and . CCTA, page 314-319. IEEE, (2019)Decomposing Numerically Controlled Oscillator in Parallel Digital Down Conversion Architecture., , , and . Journal of Circuits, Systems, and Computers, 26 (9): 1750126:1-1750126:14 (2017)Using the CAI Software (InventionTool 3.0) to solve complexity problem., and . IFIP CAI, volume 250 of IFIP, page 115-123. Springer, (2007)Modeling Quantum Entanglements in Quantum Language Models., , , , , and . IJCAI, page 1362-1368. AAAI Press, (2015)Online Object Tracking Based on CNN with Metropolis-Hasting Re-Sampling., , , and . ACM Multimedia, page 1163-1166. ACM, (2015)Low-complexity detection for multi-antenna differential unitary space-time modulation systems., , , , and . ICCC, page 1-5. IEEE, (2017)Monitoring Artificial Surface Expansion in Ecological Redline Zones by Multi-Temporal VHR Images., , , , and . MultiTemp, page 1-4. IEEE, (2019)