Author of the publication

An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext.

, , , and . Int. J. Netw. Secur., 15 (3): 161-170 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient certificateless public key cryptography with authorized equality test in IIoT., , , and . J. Ambient Intell. Humaniz. Comput., 11 (3): 1065-1083 (2020)Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"., , , and . IEEE Internet Things J., 7 (5): 4676-4681 (2020)Impulsive Consensus Control for General Second-Order Multi-agent Systems., , , and . ISIE, page 1804-1809. IEEE, (2019)Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT., , , , , and . DSC, page 1-8. IEEE, (2019)An efficient and revocable storage CP-ABE scheme in the cloud computing., , , , and . Computing, 101 (8): 1041-1065 (2019)Asynchronous impulsive control for consensus of second-order multi-agent networks., , , and . Commun. Nonlinear Sci. Numer. Simul., (2019)An Improved Certificateless Signature Scheme Secure in the Standard Model., , and . Fundam. Informaticae, 88 (1-2): 193-206 (2008)Cryptanalysis of an Identity Based Signcryption without Random Oracles., , and . Fundam. Informaticae, 107 (1): 105-109 (2011)A Survey of Group Key Agreement Protocols with Constant Rounds., , and . ACM Comput. Surv., 52 (3): 57:1-57:32 (2019)Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing., , , , and . Future Gener. Comput. Syst., (2019)