Author of the publication

Key-policy attribute-based encryption against continual auxiliary input leakage.

, , , and . Inf. Sci., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourced data tagging via authority and delegable auditing for cloud storage., , , and . ICCST, page 131-134. IEEE, (2015)Discrete Branch Length Representations for Genetic Algorithms in Phylogenetic Search., and . EvoWorkshops, volume 3005 of Lecture Notes in Computer Science, page 94-103. Springer, (2004)Written Texts as Statistical Mechanical Problem., , and . ICTIR, volume 5766 of Lecture Notes in Computer Science, page 241-248. Springer, (2009)A RFID Based Localization Algorithm for Wireless Sensor Networks., , , , and . ICCCS (2), volume 10040 of Lecture Notes in Computer Science, page 275-285. (2016)Synchronization problem of 2-D coupled dynamical networks with communication delays and missing measurements., and . Multidimens. Syst. Signal Process., 30 (1): 39-67 (2019)A new lower bound on error probability for nonuniform signals over AWGN channels., , and . WCNC, page 3005-3009. IEEE, (2013)A Multi-stage Feature Subset Selection Approach for Classification., , and . ICBAR, page 196-200. ACM, (2023)PpNNT: Multiparty Privacy-Preserving Neural Network Training System., , , , and . IEEE Trans. Artif. Intell., 5 (1): 370-383 (January 2024)A Privacy-Preserving Health Data Aggregation Scheme., , , , and . KSII Trans. Internet Inf. Syst., 10 (8): 3852-3864 (2016)A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs., , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 794-799. Springer, (2019)