Author of the publication

Keyword Search Shareable Encryption for Fast and Secure Data Replication.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds., , , and . Concurr. Comput. Pract. Exp., 27 (8): 2004-2027 (2015)Efficient Encrypted Data Search With Expressive Queries and Flexible Update., , , , , and . IEEE Trans. Serv. Comput., 15 (3): 1619-1633 (2022)Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 14 (8): 3618-3627 (2018)SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications., , , , , , , , and . IEEE Internet Things J., 7 (4): 2539-2552 (2020)CCA-Secure Deterministic Identity-Based Encryption Scheme., , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles., , , , , and . CoRR, (2021)Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data., , , and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2365-2376 (2016)An efficient blind filter: Location privacy protection and the access control in FinTech., , , , , and . Future Gener. Comput. Syst., (2019)A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction., , , , and . Secur. Commun. Networks, 8 (16): 2836-2849 (2015)Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership., , , , , and . J. Syst. Softw., (2022)