Author of the publication

Minimal key set of binary key-derivation tree in cloud storage.

, , , , , and . Soft Comput., 27 (2): 1177-1188 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Restricting the Number of Times That Data Can Be Accessed in Cloud Storage Using TrustZone., , , and . CCGRID, page 289-296. IEEE, (2022)Multi-Stage Expansion Planning for Decarbonizing Thermal Generation Supported Renewable Power Systems Using Hydrogen and Ammonia Storage., , , , , , and . CoRR, (2023)Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations., , , and . BigDataSE, page 147-154. IEEE, (2020)Limited Times of Data Access Based on SGX in Cloud Storage., , , , , and . SMC, page 3146-3151. IEEE, (2021)zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs., , , , , , , and . TrustCom, page 656-663. IEEE, (2020)Minimal key set of binary key-derivation tree in cloud storage., , , , , and . Soft Comput., 27 (2): 1177-1188 (2023)Post-Quantum Anonymous, Traceable and Linkable Authentication Scheme Based on Blockchain for Intelligent Vehicular Transportation Systems., , , , , , and . IEEE Trans. Intell. Transp. Syst., 25 (9): 12108-12119 (September 2024)A Symbolic Model for Systematically Analyzing TEE-Based Protocols., , , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 126-144. Springer, (2020)Mal-lightDet: A light method to detect malicious encrypted traffic based on machine learning., , , and . CCRIS, page 64-68. ACM, (2023)Video stabilization algorithm based on virtual sphere model., , , and . J. Electronic Imaging, 30 (2): 021002 (2021)