Author of the publication

Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.

, , , , , and . Comput. J., 67 (1): 179-194 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes., , , and . IEEE Trans. Veh. Technol., 70 (6): 5254-5264 (2021)AnoGLA: An efficient scheme to improve network anomaly detection., and . J. Inf. Secur. Appl., (2022)Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment., , and . Int. J. Inf. Sec., 22 (3): 679-689 (June 2023)Secret Share Based Program Access Authorization Protocol for Smart Metering., , , , and . Int. J. Netw. Secur., 18 (6): 1071-1079 (2016)A Multi-dimensional Packet Classification Algorithm Based on Hierarchical All-Match B+ Tree., , , and . HPCC/EUC, page 1329-1336. IEEE, (2013)FedLVR: a federated learning-based fine-grained vehicle recognition scheme in intelligent traffic system., , , and . Multim. Tools Appl., 82 (24): 37431-37452 (October 2023)Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks., , , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 19-34. Springer, (2013)Improved detection for copy-move forgery with multi-scale sliding windows., , , and . ISPACS, page 231-236. IEEE, (2017)An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer., , , , and . IEEE Access, (2020)Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy., , , , and . IEEE Trans. Cloud Comput., 11 (4): 3737-3749 (October 2023)