Author of the publication

一种改进的属性加密方案 (Improved Attribute-based Encryption Scheme).

, , , , and . 计算机科学, 44 (1): 167-171 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Proxy Signature for Cloud Service in SaaS., , , and . INCoS, page 594-599. IEEE, (2012)Performance Comparison of Machine Learning Platforms., , , , , , , , , and 11 other author(s). INFORMS J. Comput., 31 (2): 207-225 (2019)Load Identification for a Cantilever Beam Based on Fiber Bragg Grating Sensors., , and . Sensors, 17 (8): 1733 (2017)An intra-class distribution-focused generative adversarial network approach for imbalanced tabular data learning, , , , and . International Journal of Machine Learning and Cybernetics, (2024)A matrix-based cross-layer key establishment protocol for smart homes., , , , and . Inf. Sci., (2018)A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle., , , , , and . IEEE Internet Things J., 7 (2): 1061-1071 (2020)Information-Minimizing Generative Adversarial Network for Fair Generation and Classification., , , , and . Neural Process. Lett., 56 (1): 36 (February 2024)Adaptive nonsingular terminal sliding mode control for rehabilitation robots., , and . Comput. Electr. Eng., (2022)GREAP: a comprehensive enrichment analysis software for human genomic regions., , , , , , , , , and 9 other author(s). Briefings Bioinform., (2022)Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 996-1010 (2019)