Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing., , , , and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 138-148. Springer, (2020)Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure., , , and . EIDWT, volume 47 of Lecture Notes on Data Engineering and Communications Technologies, page 290-300. Springer, (2020)Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles., , , , and . IEEE Access, (2020)Decentralized data outsourcing auditing protocol based on blockchain., , , and . J. Ambient Intell. Humaniz. Comput., 12 (2): 2703-2714 (2021)Toward practical privacy-preserving linear regression., , , , , and . Inf. Sci., (2022)Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing., , , , and . Int. J. Mob. Comput. Multim. Commun., 12 (3): 27-43 (2021)Improved secure PCA and LDA algorithms for intelligent computing in IoT-to-cloud setting., , , , and . Comput. Intell., (February 2024)An Area-Efficient Design of Enhanced Space-Time Redundant DFF (IEST_TMR DFF)., , , and . ICCCS, page 721-726. IEEE, (2022)Toward Secure K-means Clustering Based on Homomorphic Encryption in Cloud., , , , and . EIDWT, volume 118 of Lecture Notes on Data Engineering and Communications Technologies, page 52-62. Springer, (2022)Secure Data Set Operation Protocols for Outsourced Cloud Data to Protect User Privacy in Smart City., , , , and . J. Circuits Syst. Comput., 30 (15): 2150267:1-2150267:25 (2021)