Author of the publication

Attribute-Based Fine-Grained Access Control with User Revocation.

, , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 586-595. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical analysis of strongly nonlinear PDEs., , and . Acta Numer., (2017)A GAA-based batch authentication and key agreement for LTE networks., , , , and . Int. J. Embed. Syst., 7 (3/4): 289-295 (2015)Contraction property of adaptive hybridizable discontinuous Galerkin methods., , and . Math. Comput., 85 (299): 1113-1141 (2016)Dynamic Group Based Authentication Protocol for Machine Type Communications., , , , , and . INCoS, page 334-341. IEEE, (2012)Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs., , , and . INCoS, page 358-362. IEEE, (2013)Military Units Importance Evaluation Based on Complex Networks., , and . MVHI, page 737-740. IEEE Computer Soceity, (2010)Research of Action Description of Virtual Vehicle in Transportation Virtual Scene Based on VRML., , and . MVHI, page 741-743. IEEE Computer Soceity, (2010)Group Key Agreement in Multimedia Service for Machine Type Communication., , , , and . APSCC, page 141-146. IEEE Computer Society, (2014)An Effective Cloud-Based Active Defense System against Malicious Codes., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 690-695. Springer, (2014)A Finite Element Method for Nematic Liquid Crystals with Variable Degree of Orientation., , and . SIAM J. Numerical Analysis, 55 (3): 1357-1386 (2017)