Author of the publication

Adaptively secure certificate-based broadcast encryption and its application to cloud storage service.

, , , and . Inf. Sci., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Ergativization of the Verb "死"si(Die) in Chinese Language History.. CLSW, volume 8922 of Lecture Notes in Computer Science, page 124-133. Springer, (2014)An Ordered Bipolar Outflow from a Massive Early-Stage Core, , , , , and . (Jan 24, 2016)Outflow-Confined H II Regions. I. First Signposts of Massive Star Formation, , and . (2015)cite arxiv:1509.06754Comment: 18 pages, 17 figures, submitted to ApJ.FUEL: Fast UAV Exploration using Incremental Frontier Structure and Hierarchical Planning., , , and . CoRR, (2020)Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation., , , and . Int. J. Inf. Sec., 14 (6): 487-497 (2015)Cryptanalysis and Improvement for Certificateless Aggregate Signature., , and . Fundam. Informaticae, 157 (1-2): 111-123 (2018)Geological Hazard Assessment of Secondary Collapses Due to Volcanic Earthquakes on Changbai Mountain in China., , , , , and . ISPRS Int. J. Geo Inf., 12 (8): 307 (July 2023)Deep Active Learning for Solvability Prediction in Power Systems., , , , and . CoRR, (2020)Online Statistical Inference for Matrix Contextual Bandit., , and . CoRR, (2022)Voice control dual arm robot based on ROS system., , , , and . ISR, page 232-237. IEEE, (2018)