Cited By
View all- Tseng Y(2025)Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hidingJournal of Information Security and Applications10.1016/j.jisa.2024.10395989(103959)Online publication date: Mar-2025
- Liu ZMambo MTso RTseng Y(2024)Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systemsComputer Standards & Interfaces10.1016/j.csi.2023.10381789:COnline publication date: 25-Jun-2024
- Tseng Y(2024)Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryptionComputer Standards & Interfaces10.1016/j.csi.2023.10379688(103796)Online publication date: Mar-2024
- Show More Cited By