Cited By
View all- Wu AZhang YZhu JZhao QZhang Y(2024)Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud ComputingIEEE Transactions on Cloud Computing10.1109/TCC.2024.338612612:2(659-670)Online publication date: Apr-2024
- Li PXia JWang QZhang YWu M(2024)Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspectiveComputer Networks10.1016/j.comnet.2024.110641251(110641)Online publication date: Sep-2024
- Prof. Aravinda Thejas Chandra Bommineni Lakshmi Ramya Dhanunjaya Reddy Sai Lavanya Bhoomika R Chethana S (2023)A Secure and Optimal Content Validation and Protection Scheme for Information Centric NetworksInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-9717(58-66)Online publication date: 3-May-2023
- Show More Cited By