Author of the publication

Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks.

, , and . Mob. Inf. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments., , , , and . Peer-to-Peer Netw. Appl., 14 (6): 3488-3501 (2021)Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks., , and . Mob. Inf. Syst., (2020)Real-time 3D-Lidar, MMW Radar and GPS/IMU fusion based vehicle detection and tracking in unstructured environment., , , , and . ICRA, page 13339-13345. IEEE, (2021)3D-Lidar Based Negative Obstacle Detection in Unstructured Environment., , , , , and . ICVISP, page 45:1-45:6. ACM, (2020)Face Recognition Based on WT, FastICA and RBF Neural Network., , and . ICNC (2), page 3-7. IEEE Computer Society, (2007)Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search Over Encrypted Cloud Data., , , , , and . ICC, page 1-6. IEEE, (2019)Multi-keyword Search Based on Attribute Encryption., , , and . WISA, volume 11817 of Lecture Notes in Computer Science, page 340-346. Springer, (2019)Block Modelling and Learning for Structure Analysis of Networks with Positive and Negative Links., , , , and . KSEM (2), volume 11062 of Lecture Notes in Computer Science, page 396-402. Springer, (2018)DNEA: Dynamic Network Embedding Method for Anomaly Detection., , , and . KSEM, volume 12817 of Lecture Notes in Computer Science, page 236-248. Springer, (2021)Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication., , , , and . IEEE Access, (2020)