Author of the publication

Enhanced authentication for outsourced educational contents through provable block possession.

, , , and . Multim. Tools Appl., 75 (21): 13057-13076 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search., and . IEEE Access, (2022)Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage., , , and . IEEE Trans. Cloud Comput., 10 (2): 1008-1020 (2022)Secure deduplication with reliable and revocable key management in fog computing., , , and . Peer-to-Peer Netw. Appl., 12 (4): 850-864 (2019)Secure Device-to-Device Authentication in Mobile Multi-hop Networks., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 267-278. Springer, (2014)Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea., , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 357-369. Springer, (2019)Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems., , and . IEEE Internet Things J., 6 (4): 6301-6309 (2019)A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 624-635. Springer, (2014)A secure OTP algorithm using a smartphone application., , and . ICUFN, page 476-481. IEEE, (2015)Order-Hiding Range Query Over Encrypted Cloud Data., , and . IEEE Access, (2022)Secure deduplication for multimedia data with user revocation in cloud storage., , , and . Multim. Tools Appl., 76 (4): 5889-5903 (2017)