Author of the publication

Proxy Re-encryption with Delegatable Verifiability.

, and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 120-133. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tools for privacy preserving distributed data mining, , , , and . SIGKDD Explor. Newsl., 4 (2): 28--34 (2002)An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 59 (7): 3589-3603 (2010)Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach., , , , and . IEEE Internet Things J., 7 (8): 7564-7574 (2020)Coordinated Control Strategies for SMES-Battery Hybrid Energy Storage Systems., and . IEEE Access, (2017)Active Learning From Stream Data Using Optimal Weight Classifier Ensemble., , , and . IEEE Trans. Syst. Man Cybern. Part B, 40 (6): 1607-1621 (2010)Patient-Centric Fine-Grained Access Control for Electronic Medical Record Sharing With Security via Dual-Blockchain., , and . IEEE Trans. Netw. Sci. Eng., 10 (6): 3908-3921 (November 2023)Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions., , , and . IEEE Wirel. Commun., 22 (2): 136-144 (2015)A Selective Linearization Method For Multiblock Convex Optimization., , and . SIAM J. Optim., 27 (2): 1102-1117 (2017)Series Editorial: Vehicular Networking and 6G Data Taxonomy., and . IEEE Commun. Stand. Mag., 6 (1): 75 (2022)A simple deniable authentication protocol based on the Diffie-Hellman algorithm., , , , and . Int. J. Comput. Math., 85 (9): 1315-1323 (2008)