Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permutable Cut-and-Choose Oblivious Transfer and Its Application., , , and . IEEE Access, (2020)Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps., , , , , and . Soft Comput., 22 (7): 2267-2274 (2018)Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing., , , , , and . Soft Comput., 21 (24): 7325-7335 (2017)An Adaptive Sweep-Circle Spatial Clustering Algorithm Based on Gestalt., , and . ISPRS Int. J. Geo Inf., 6 (9): 272 (2017)Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks., , , , , and . Mob. Inf. Syst., (2015)New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems., , , and . J. High Speed Networks, 22 (2): 153-167 (2016)Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption., , , , , and . J. Ambient Intell. Humaniz. Comput., 15 (2): 1327-1337 (February 2024)Privacy preserved wireless sensor location protocols based on mobile edge computing., , , and . Comput. Secur., (2019)New directly revocable attribute-based encryption scheme and its application in cloud storage environment., , , and . Clust. Comput., 20 (3): 2385-2392 (2017)Growth Analysis and CUSSIM Model in Cucumber Seedling., , , , and . IITA, page 319-322. IEEE Computer Society, (2007)