Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey: Error control methods used in bio-cryptography., , and . FSKD, page 956-962. IEEE, (2014)A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges., , and . Comput. Networks, (November 2023)A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records., and . SACMAT, page 255-262. ACM, (2017)A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing., and . CIC, page 46-53. IEEE Computer Society, (2016)Secure Multi-party Based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data., , , and . ICIN, IFIP, (2016)Attribute based access control scheme with controlled access delegation for collaborative E-health environments., and . J. Inf. Secur. Appl., (2017)An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment., and . ACM Trans. Internet Techn., 19 (3): 41:1-41:22 (2019)Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment., and . iThings/GreenCom/CPSCom/SmartData, page 1204-1211. IEEE, (2018)An attribute based access control scheme for secure sharing of electronic health records., and . HealthCom, page 1-6. IEEE, (2016)Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions., and . Int. J. Inf. Manag., 36 (6): 1161-1173 (2016)