Author of the publication

Private Security for the Cloud Mobile via a Strong Authentication Method.

, , , and . CDVE, volume 11792 of Lecture Notes in Computer Science, page 190-200. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud Computing., , and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 193-207. Springer, (2019)Privacy and Tracking in the Emerging Mobile Applications: A Survey., , and . IWCMC, page 1491-1496. IEEE, (2023)I4AS-Cloud: Identification, Authentication and Authorization As A Service Cloud Computing., , and . IWCMC, page 1460-1465. IEEE, (2023)TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing., , and . J. Inf. Secur. Appl., (2021)Private Security for the Cloud Mobile via a Strong Authentication Method., , , and . CDVE, volume 11792 of Lecture Notes in Computer Science, page 190-200. Springer, (2019)Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing., , and . WiMob, page 1-6. IEEE, (2019)End to End Cloud Computing Architecture Based on A Novel Classification of Security Issues., , , and . AICCSA, page 303-310. IEEE Computer Society, (2017)Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing., , and . IWCMC, page 1860-1865. IEEE, (2019)Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card., , and . J. Supercomput., 78 (1): 497-522 (2022)