Author of the publication

A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.

, , , , and . Wirel. Pers. Commun., 114 (4): 2783-2800 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless proxy multi-signature., and . Inf. Sci., (2014)Study on the Technology of the Secure Computation in the Different Adversarial Models., , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 473-478. Springer, (2011)Cryptanalysis and improvement of a certificateless encryption scheme in the standard model., , , and . Frontiers Comput. Sci., 8 (1): 163-173 (2014)A lattice-based digital signature from the Ring-LWE., , , and . IC-NIDC, page 646-651. IEEE, (2012)Constructions of resilient rotation symmetric boolean functions on given number of variables., , , and . IET Inf. Secur., 8 (5): 265-272 (2014)Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on pq Variables., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (7): 1653-1656 (2013)A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (10): 1801-1805 (2012)New Perfect Gaussian Integer Sequences of Period pq., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (11): 2290-2293 (2013)Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds., , , , , and . IEEE Trans. Cloud Comput., 11 (1): 308-323 (January 2023)An Improved Certificateless Signcryption in the Standard Model., and . Int. J. Netw. Secur., 17 (5): 597-606 (2015)