From post

An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage.

, , и . ICA3PP (Workshops and Symposiums), том 9532 из Lecture Notes in Computer Science, стр. 633-647. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep Reinforcement Learning Assisted UAV Trajectory and Resource Optimization for NOMA Networks., , и . WCSP, стр. 933-938. IEEE, (2022)T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection., , и . SocialSec, стр. 72-79. IEEE Computer Society, (2015)RScam: Cloud-Based Anti-Malware via Reversible Sketch., , , и . SecureComm, том 164 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 157-174. Springer, (2015)An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage., , и . ICA3PP (Workshops and Symposiums), том 9532 из Lecture Notes in Computer Science, стр. 633-647. Springer, (2015)Gated Convolutional Neural Network for Sentence Matching., , , , и . INTERSPEECH, стр. 2853-2857. ISCA, (2018)High-fidelity and Lip-synced Talking Face Synthesis via Landmark-based Diffusion Model., , , , и . CoRR, (2024)Pseudo-Supervised Approach for Text Clustering Based on Consensus Analysis., , , и . ICASSP, стр. 6184-6188. IEEE, (2018)Tibetan-Mandarin bilingual speech recognition based on end-to-end framework., , , и . APSIPA, стр. 1214-1217. IEEE, (2017)Removing Key Escrow from the LW-HIBE Scheme., , , , и . ICA3PP (Workshops and Symposiums), том 9532 из Lecture Notes in Computer Science, стр. 593-605. Springer, (2015)Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security., , , , , , и . HPCC/SmartCity/DSS, стр. 430-437. IEEE Computer Society, (2016)