Author of the publication

Dual trapdoor identity-based encryption with keyword search.

, , and . Soft Comput., 21 (10): 2599-2607 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and short certificateless signatures secure against realistic adversaries., , and . J. Supercomput., 55 (2): 173-191 (2011)Improved handover authentication and key pre-distribution for wireless mesh networks., , , and . Concurr. Comput. Pract. Exp., 28 (10): 2978-2990 (2016)Advances in secure and intelligent data processing., , , and . Concurr. Comput. Pract. Exp., 26 (5): 1021-1022 (2014)Special issue on security and privacy for smart cities., , , and . Pers. Ubiquitous Comput., 21 (5): 775 (2017)Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts., , , , , and . Inf. Sci., (2022)ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices., , , , and . IEEE Internet Things J., 7 (2): 1216-1229 (2020)Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks., , , , , , and . IEEE Internet Things J., 9 (14): 12209-12218 (2022)Blockchain-Based Secure and Lightweight Authentication for Internet of Things., , , , , , , and . IEEE Internet Things J., 9 (5): 3321-3332 (2022)A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid., , , , and . IEEE Trans. Cloud Comput., 3 (2): 233-244 (2015)Cooperative Technology Innovation Factors Identification and Analysis in the Manufacturing Virtual Industry Cluster., , , and . J. Uncertain Syst., 15 (1): 2250002:1-2250002:14 (2022)