From post

A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.

, и . CSEE (2), том 215 из Communications in Computer and Information Science, стр. 131-136. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs., , и . J. Ambient Intell. Humaniz. Comput., 7 (5): 681-692 (2016)A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience., , , , и . J. Supercomput., 75 (6): 3099-3122 (2019)A Deep Reinforcement Learning Scheme for SCMA-Based Edge Computing in IoT Networks., , и . GLOBECOM, стр. 5044-5049. IEEE, (2022)Forward Secure Conjunctive-Keyword Searchable Encryption., , , , , , и . IEEE Access, (2019)Enabling cloud storage auditing with key-exposure resilience under continual key-leakage., , , , , и . Inf. Sci., (2020)An Optimization Scheme for SCMA-Based Multi-Access Edge Computing., , и . VTC Spring, стр. 1-6. IEEE, (2021)Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks., , , , , и . Mob. Networks Appl., 26 (6): 2490-2500 (2021)Learning-Based Latency and Energy Optimization in SCMA-Enhanced UAV-MEC Networks., , и . ICCC, стр. 1-6. IEEE, (2023)Anonymous Identity-Based Encryption with Bounded Leakage Resilience., , , и . AINA Workshops, стр. 287-292. IEEE Computer Society, (2015)SCMA-Enabled Multi-Cell Edge Computing Networks: Design and Optimization., , , , , , и . IEEE Trans. Veh. Technol., 72 (6): 7987-8003 (июня 2023)