Author of the publication

Large universe multi-authority attribute-based PHR sharing with user revocation.

, , , and . Int. J. Comput. Sci. Eng., 19 (3): 376-386 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of the Impact of Individual Differences on Online Shopping., , and . IJEBR, 6 (1): 52-67 (2010)A Model of System Re-Configurability and Pedagogical Usability in an E-Learning Context: A Faculty Perspective., , and . JOEUC, 22 (3): 66-81 (2010)An efficiency-enhanced wireless power transfer system with segmented transmitting coils for endoscopic capsule., , , , , , and . ISCAS, page 2279-2282. IEEE, (2013)The chromatic equivalence class of graph ‾Bn-6, 12., , , and . Discussiones Mathematicae Graph Theory, 28 (2): 189-218 (2008)An Effective Cloud-Based Active Defense System against Malicious Codes., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 690-695. Springer, (2014)Receiver design for OFDM-CDMA systems with multiplexed STBC., , and . PIMRC, page 2420-2424. IEEE, (2005)Spatial Compression for Fronthaul-Constrained Uplink Receiver in 5G Systems., , , and . WCNC, page 1-6. IEEE, (2019)Crossing the Format Boundary of Text and Boxes: Towards Unified Vision-Language Modeling., , , , , , , and . CoRR, (2021)Convolutional Neural Networks With Gated Recurrent Connections., and . IEEE Trans. Pattern Anal. Mach. Intell., 44 (7): 3421-3435 (2022)Towards efficient privacy-preserving encrypted image search in cloud computing., , , and . Soft Comput., 23 (6): 2101-2112 (2019)