Author of the publication

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability.

, , , , and . KSII Trans. Internet Inf. Syst., 12 (4): 1832-1853 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diff-LfD: Contact-aware Model-based Learning from Visual Demonstration for Robotic Manipulation via Differentiable Physics-based Simulation and Rendering., , , , , , , , , and 2 other author(s). CoRL, volume 229 of Proceedings of Machine Learning Research, page 499-512. PMLR, (2023)A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems., , and . Mob. Networks Appl., 26 (6): 2509-2514 (2021)Active learning for P2P traffic identification., and . Peer-to-Peer Netw. Appl., 8 (5): 733-740 (2015)A Mobile Internet Multi-level Two-way Identity Authentication Scheme Based on Zero Trust., , and . HPCC/DSS/SmartCity/DependSys, page 1650-1656. IEEE, (2021)Cognitive Radio-Based Smart Grids: From the Perspective of Full-Duplex Primary Users., , and . IEEE Access, (2018)Research on fire rescue path optimization of unmanned equipment based on improved Slime mould Algorithm., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)The Controller Placement of Software-Defined Networks Based on Minimum Delay and Load Balancing., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 310-313. IEEE Computer Society, (2018)A Review of Issues and Challenges in Fog Computing Environment., , , and . DASC/PiCom/DataCom/CyberSciTech, page 232-237. IEEE, (2019)A hybrid recommendation algorithm based on social networks., , , , and . QSHINE, page 329-334. IEEE, (2015)Tracking Deformable Parts via Dynamic Conditional Random Fields., , , and . CoRR, (2013)