Author of the publication

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems.

, , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 83-97. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Provenance of Distributed Processes in an Untrusted Environment., , and . IEICE Trans. Inf. Syst., 95-D (7): 1894-1907 (2012)Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 343-360. Springer, (2007)Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption., , and . J. Internet Serv. Inf. Secur., 8 (4): 37-56 (2018)Distributed Paillier Cryptosystem without Trusted Dealer., and . WISA, volume 6513 of Lecture Notes in Computer Science, page 44-60. Springer, (2010)Differential Fault Analysis of Full LBlock., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 135-150. Springer, (2012)Accelerating Polynomial Evaluation for Integer-wise Homomorphic Comparison and Division., , and . J. Inf. Process., (2023)Regularization with Latent Space Virtual Adversarial Training., , , and . CoRR, (2020)Latent Space Virtual Adversarial Training for Supervised and Semi-Supervised Learning., , , and . IEICE Trans. Inf. Syst., 105-D (3): 667-678 (2022)Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 107 (3): 234-247 (2024)Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs., , and . IMIS, page 660-664. IEEE Computer Society, (2012)