From post

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.

, , , и . Secur. Commun. Networks, 9 (18): 4897-4913 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords., , , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 31-43. Springer, (2007)Performance analysis of two bridged CSMA/CD networks., , , , и . Comput. Commun., 16 (8): 501-510 (1993)Hybrid privacy-preserving clinical decision support system in fog-cloud computing., , , , и . Future Gener. Comput. Syst., (2018)A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks., , и . IEEE J. Sel. Areas Commun., 11 (9): 1438-1448 (1993)Position Manipulation Attacks to Balise-Based Train Automatic Stop Control., , , и . IEEE Trans. Vehicular Technology, 67 (6): 5287-5301 (2018)Trellis-coded multidimensional phase modulation., , , , и . IEEE Trans. Inf. Theory, 36 (1): 63-89 (1990)New Paradigm of Inference Control with Trusted Computing., , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 243-258. Springer, (2007)Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , и . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)Lightweight Sharable and Traceable Secure Mobile Health System., , , и . IEEE Trans. Dependable Secur. Comput., 17 (1): 78-91 (2020)An Efficient Privacy-Preserving Outsourced Computation over Public Data., , , и . IEEE Trans. Serv. Comput., 10 (5): 756-770 (2017)