Author of the publication

A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare.

, , and . MASS, page 299-306. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16-classification partition of formula set F(S) in revised Kleene system W., , and . Soft Comput., 10 (2): 115-118 (2006)Applications of polarimetric decomposition technology in a dried up lake evolution., , , and . IGARSS, page 4499-4502. IEEE, (2010)Practical secure and fast handoff framework for pervasive Wi-Fi access., , , and . IET Inf. Secur., 7 (1): 22-29 (2013)Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1503-1508. IEEE, (2018)Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks., , , and . IEEE Trans. Parallel Distributed Syst., 25 (9): 2286-2296 (2014)Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges., , and . IEEE Netw., 31 (1): 11-17 (2017)Enhanced Location Privacy Preserving Scheme in Location-Based Services., , and . IEEE Syst. J., 11 (1): 219-230 (2017)Cyberspace Security for Future Internet., , , , and . Secur. Commun. Networks, (2018)Resource Management in a Peer to Peer Cloud Network for IoT., , and . Wirel. Pers. Commun., 115 (3): 2471-2488 (2020)Hole Avoiding in Advance Routing in Wireless Sensor Networks., , , and . WCNC, page 3519-3523. IEEE, (2007)