Meshram, Chandrashekhar; Lee, Cheng-Chi; Meshram, Sarita Gajbhiye; Khan, Muhammad Khurram An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. (English) Zbl 1436.94083 Soft Comput. 23, No. 24, 13127-13138 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{C. Meshram} et al., Soft Comput. 23, No. 24, 13127--13138 (2019; Zbl 1436.94083) Full Text: DOI
Meshram, Chandrashekhar; Lee, Cheng-Chi; Meshram, Sarita Gajbhiye; Li, Chun-Ta An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. (English) Zbl 1418.94057 Soft Comput. 23, No. 16, 6937-6946 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Meshram} et al., Soft Comput. 23, No. 16, 6937--6946 (2019; Zbl 1418.94057) Full Text: DOI