Search for persons
X
?
Frontier Computing on Industrial Applications Volume 4; Lecture Notes in Electrical Engineering ,
3
Cryptanalysis and Improvement to Two Key-Policy Attribute-B..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
7
Public Key Encryption with Hierarchical Authorized Keyword ..:
, In:
?
2023 18th Asia Joint Conference on Information Security (AsiaJCIS) ,
8
Anonymous and Unlinkable Identity Scheme in Open Data Envir..:
, In:
?
2023 18th Asia Joint Conference on Information Security (AsiaJCIS) ,
9
A Novel Ciphertext-Policy Attribute-Based Encryption Suppor..:
, In:
?
2022 17th Asia Joint Conference on Information Security (AsiaJCIS) ,
11
Cryptanalysis to Ming et al.'s Revocable Multi-Authority At..:
, In:
?
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications; Smart Innovation, Systems and Technologies ,
12
Lightweight and Efficient Source Authentication Scheme Base..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
13
Blockchain-Based Confidential Payment System with Controlla..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
14
Blockchain-Based Self-Sovereign Identity System with Attrib..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
15