Author of the publication

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.

, , , , , , , and . Future Gener. Comput. Syst., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment., , , , , and . IEEE Access, (2019)Efficient Encrypted Data Search With Expressive Queries and Flexible Update., , , , , and . IEEE Trans. Serv. Comput., 15 (3): 1619-1633 (2022)A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds., , , and . Concurr. Comput. Pract. Exp., 27 (8): 2004-2027 (2015)Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 14 (8): 3618-3627 (2018)SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications., , , , , , , , and . IEEE Internet Things J., 7 (4): 2539-2552 (2020)CCA-Secure Deterministic Identity-Based Encryption Scheme., , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)Privacy Concerns for Photo Sharing in Online Social Networks., , , and . IEEE Internet Comput., 19 (2): 58-63 (2015)Using Autoencoders on Differentially Private Federated Learning GANs., , and . CoRR, (2022)PIVODL: Privacy-preserving vertical federated learning over distributed labels., , , and . CoRR, (2021)Stronger and Simpler Updatable Encryption., , and . IACR Cryptol. ePrint Arch., (2022)