Author of the publication

Efficient public key encryption with user-friendly keywords search for searchable cloud storage.

, , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 724-733. IOS Press, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the security models for certificateless signature schemes achieving level 3 security., and . IACR Cryptology ePrint Archive, (2011)An Active Attack on Protocols for Server-Aided RSA Signature Computation.. Inf. Process. Lett., 65 (2): 71-73 (1998)Prediction-Based Reversible Data Hiding Using Energy Deviation Strategy., , , , and . J. Inf. Hiding Multim. Signal Process., 9 (2): 293-302 (2018)Security Analysis of Choi et al.'s Certificateless Short Signature Scheme., , and . J. Inf. Hiding Multim. Signal Process., 4 (3): 147-154 (2013)Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification., , , and . J. Inf. Hiding Multim. Signal Process., (2015)A novel secret image sharing scheme for true-color images with size constraint., , , and . Inf. Sci., 179 (19): 3247-3254 (2009)Protecting the Privacy of Users in e-Commerce Environment., and . CCCT (1), page 63-67. The International Institute of Informatics and Systemics (IIIS), (2004)Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes., and . J. Vis. Commun. Image Represent., (2022)Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme., , and . Int. J. Netw. Secur., 18 (4): 793-797 (2016)Extended Relation Metadata for SCORM-based Learning Content Management Systems., , , and . J. Educ. Technol. Soc., 13 (1): 220-235 (2010)