Showing 1 - 9 results of 9 for search 'Yongli Tang', query time: 0.02s
Refine Results
-
1
A remote sensing encrypted data search method based on a novel double-chain by Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng
Published 2023-12-01Get full text
Article -
2
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network by Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng
Published 2022-12-01Get full text
Article -
3
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme by Xixi Yan, Pengyu Cheng, Yongli Tang, Jing Zhang
Published 2024-12-01Get full text
Article -
4
-
5
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden by Jinxia Yu, Guanghui He, Xixi Yan, Yongli Tang, Rongxia Qin
Published 2020-05-01Get full text
Article -
6
Password-based three-party authenticated key exchange protocol from lattices by Jinxia YU, Huanhuan LIAN, Yongli TANG, Mengyao SHI, Zongqu ZHAO
Published 2018-11-01Get full text
Article -
7
Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG
Published 2020-04-01Get full text
Article -
8
Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG
Published 2020-04-01Get full text
Article -
9