Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to securely outsource the inversion modulo a large composite number., , , , and . J. Syst. Softw., (2017)An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain., , , and . ICWS, volume 11512 of Lecture Notes in Computer Science, page 110-125. Springer, (2019)A Reputation Based Hybrid Consensus for E-Commerce Blockchain., , , , and . ICWS, volume 12406 of Lecture Notes in Computer Science, page 1-16. Springer, (2020)Revocable Attribute-Base Scheme with Enhanced Security and Privacy for Healthcare Data Sharing., and . PAAP, page 1-8. IEEE, (2023)Distributed Attribute-Based Signature With Attribute Dynamic Update for Smart Grid., , , , and . IEEE Trans. Ind. Informatics, 19 (9): 9424-9435 (2023)Secure Computation Outsourcing for Inversion in Finite Field., , , , , and . J. Internet Serv. Inf. Secur., 10 (2): 35-48 (2020)Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud., , and . Comput. J., 63 (8): 1271 (2020)Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability., , , , , and . J. Syst. Softw., (2016)Collimatorless Scintigraphy for Imaging Extremely Low Activity Targeted Alpha Therapy (TAT) with Weighted Robust Least Squares (WRLS)., , , , , , and . MICCAI (7), volume 12267 of Lecture Notes in Computer Science, page 803-811. Springer, (2020)