Author of the publication

An Architecture for Secure Web Resource with Outsourced Database.

, , , , and . FedCSIS (Position Papers), volume 6 of Annals of Computer Science and Information Systems, page 133-139. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Exchange Algorithm Based on Homomorphic Encryption., and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 793-795. (2017)Public Key and Digital Signature for Blockchain Technology - Based on the Complexity of Solving a System of Polynomial Equations., , , , and . IntelliSys (1), volume 868 of Advances in Intelligent Systems and Computing, page 1251-1258. Springer, (2018)An Architecture for Secure Web Resource with Outsourced Database., , , , and . FedCSIS (Position Papers), volume 6 of Annals of Computer Science and Information Systems, page 133-139. (2015)Solution for Secure Private Data Storage in a Cloud., , , , and . FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 885-889. (2014)Parametric Hash Function Resistant to Attack by Quantum Computer., and . FedCSIS, volume 15 of Annals of Computer Science and Information Systems, page 387-390. (2018)Practical fully homomorphic encryption over polynomial quotient rings., , and . WorldCIS, page 70-75. IEEE, (2013)Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function., , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 193-202. Springer, (2015)Fully Homomorphic Encryption for Secure Computations in Protected Database., , and . FedCSIS (Position Papers), volume 6 of Annals of Computer Science and Information Systems, page 125-131. (2015)Order-preserving encryption schemes based on arithmetic coding and matrices., , and . FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 891-899. (2014)