Author of the publication

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.

, , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 186-196 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy., , , , , and . IACR Cryptol. ePrint Arch., (2021)Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy., , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 283-303. Springer, (2019)Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security., , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 228-246. Springer, (2018)A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 516-528. Springer, (2017)Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 186-196 (2018)Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage., , , , , , , and . Frontiers Comput. Sci., 16 (6): 166820 (2022)A Multi-client DSSE Scheme Supporting Range Queries., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 289-307. Springer, (2018)An Encrypted Database with Enforced Access Control and Blockchain Validation., , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 260-273. Springer, (2018)Result Pattern Hiding Searchable Encryption for Conjunctive Queries., , , , , , , , and . CCS, page 745-762. ACM, (2018)Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 37-52. Springer, (2019)