Author of the publication

Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy.

, and . IEEE Trans. Knowl. Data Eng., 15 (4): 1054-1055 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments., , , , and . Inf. Process. Lett., (2022)A new privacy-preserving authentication protocol for anonymous web browsing., , , , , , , and . Concurr. Comput. Pract. Exp., (2019)Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud., , , , and . IEEE Trans. Parallel Distributed Syst., 31 (11): 2668-2681 (2020)Efficient Two-Server Password-Only Authenticated Key Exchange., , and . IEEE Trans. Parallel Distributed Syst., 24 (9): 1773-1782 (2013)Two-Factor Decryption: A Better Way to Protect Data Security and Privacy., , , , and . Comput. J., 64 (4): 550-563 (2021)A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity., and . AsiaCCS, page 613-620. ACM, (2019)Privacy of outsourced k-means clustering., , and . AsiaCCS, page 123-134. ACM, (2014)Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT., , , , , and . IEEE Internet Things J., 8 (14): 11678-11689 (2021)Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems., , and . IEEE Trans. Emerg. Top. Comput., 12 (1): 269-280 (January 2024)A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security., , and . IEEE Access, (2018)