Author:
Yarlagadda Eswar Sai,Srinivasan N.
Reference26 articles.
1. A. Lewko, B. Waters, New proof methods for attribute-based encryption: achieving full security through selective techniques, in Advances in Cryptology–CRYPTO 2012 (Springer, 2012), pp. 180–198
2. J. Li, X. Lin, Y. Zhang, J. Han, KSFOABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715–725 (2017)
3. S.P. Deore, A. Pravin, On-line Devanagari handwritten character recognition using moments features, in International Conference on Recent Trends in Image Processing and Pattern Recognition (Springer, Singapore, 2018), pp. 37–48
4. S. Xu, G. Yang, Y. Mu, R.H. Deng, Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud
5. T.P.Jacob, Implementation of randomized test pattern generation strategy. J. Theoret. Appl. Inf. Technol. 73(1) (2015)