Author of the publication

Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation.

, , , and . Inf. Sci., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmit Power Allocation with Connectivity Probability for Multi-QoS in Cluster Flight Spacecraft Network., , , , and . Wirel. Commun. Mob. Comput., (2020)Power Control for Passive QAM Multisensor Backscatter Communication Systems., , , and . J. Sensors, (2017)Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack., , , and . Sci. China Inf. Sci., 60 (5): 052105:1-052105:12 (2017)Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT., and . Secur. Commun. Networks, (2021)An Efficient Lattice-Based IBE Scheme Using Combined Public Key., , and . ICBDS, volume 1210 of Communications in Computer and Information Science, page 3-16. Springer, (2019)Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data., , , , and . IEEE Trans. Cloud Comput., 8 (1): 312-323 (2020)Vehicle Road Privacy Recommendation System Equipped with Markov Chain., , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 58-72. Springer, (2021)Research on Attribute-Based Privacy-Preserving Computing Technologies., , , and . ICBDS, volume 1796 of Communications in Computer and Information Science, page 420-432. Springer, (2022)Research on Outsourced PSI Protocols for Privacy Preserving Data Sharing., , , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 125-136. Springer, (2021)Android Malware Detection Method Based on App-Image Conversion., , , and . ICBDS, volume 1415 of Communications in Computer and Information Science, page 60-74. Springer, (2020)