Author of the publication

Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage.

, , , , and . Trustcom/BigDataSE/ISPA, page 623-629. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (10): 1891-1894 (2016)Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing., , , and . SECON, page 1-9. IEEE, (2020)Design and Practice of Virtual Experiments for Internet of Things Class., , , , and . ICCSE (2), volume 1812 of Communications in Computer and Information Science, page 441-449. Springer, (2022)Enabling Assured Deletion in the Cloud Storage by Overwriting., , , and . SCC@AsiaCCS, page 17-23. ACM, (2016)Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation., , , , and . TrustCom/BigDataSE/ISPA (1), page 434-442. IEEE, (2015)SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis., , , , and . TrustCom, page 1119-1126. IEEE, (2023)Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic., , , and . MSN, page 283-290. IEEE, (2020)EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis., , , , and . SECON, page 537-545. IEEE, (2023)Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations., , , , and . ICC, page 1-6. IEEE, (2016)Reliable and Privacy-Preserving Task Matching in Blockchain-Based Crowdsourcing., , , , , and . CIKM, page 1879-1888. ACM, (2021)