Author of the publication

Outsourced KP-ABE with Enhanced Security.

, , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 36-50. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourced KP-ABE with Enhanced Security., , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 36-50. Springer, (2014)A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search., , and . Secur. Commun. Networks, 8 (6): 879-887 (2015)Determining the Image Base of Smart Device Firmware for Security Analysis., , , , and . Wirel. Commun. Mob. Comput., (2020)An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart Grid., , and . Trustcom/BigDataSE/ISPA, page 362-369. IEEE, (2016)An efficient KP-ABE scheme for content protection in Information-Centric Networking., and . ISCC, page 830-837. IEEE Computer Society, (2016)Achieving Flexible and Self-Contained Data Protection in Cloud Computing., , and . IEEE Access, (2017)Semantic-based Compound Keyword Search over Encrypted Cloud Data., , , and . IEEE Trans. Serv. Comput., 14 (3): 850-863 (2021)RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration., , and . ISCC, page 97-103. IEEE, (2018)Multidimensional data tight aggregation and fine-grained access control in smart grid., , and . J. Inf. Secur. Appl., (2018)An Efficient and Privacy Preserving CP-ABE Scheme for Internet-Based Collaboration., and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 493-507. Springer, (2017)