Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem.. Inf. Process. Lett., 105 (4): 117-120 (2008)Integrity coded databases - protecting data integrity for outsourced databases., , , , , and . Comput. Secur., (January 2024)A Dynamic Interdomain Communication Path Setup in Active Network., , and . IWAN, volume 1653 of Lecture Notes in Computer Science, page 274-284. Springer, (1999)Integrity Coded Databases - Protecting Data Integrity for Outsourced Databases., , , , and . (November 2018)Interdomain Access Control with Policy Routing., , and . FTDCS, page 46-52. IEEE Computer Society, (1997)P2P email encryption by an identity-based one-way group key agreement protocol., , and . ICPADS, page 760-767. IEEE Computer Society, (2014)A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds.. UIC/ATC/ScalCom, page 653-656. IEEE Computer Society, (2015)Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 776-783. IEEE, (2019)An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription.. CIKM, page 285-286. ACM, (2005)A Secure Homomorphic Encryption Algorithm over Integers for Data Privacy Protection in Clouds.. SmartCom, volume 10135 of Lecture Notes in Computer Science, page 111-121. Springer, (2016)