Author of the publication

Cost-effective secure E-health cloud system using identity based cryptographic techniques.

, , , , and . Future Gener. Comput. Syst., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services., , and . IEEE Syst. J., 12 (2): 2039-2042 (2018)New Algorithms for Secure Outsourcing of Modular Exponentiations., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)Continuous Authentication for the Internet of Things Using Channel State Information., , and . GLOBECOM, page 1-6. IEEE, (2019)Publicly verifiable database scheme with efficient keyword search., , , and . Inf. Sci., (2019)Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3621-3639 (2022)Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization., , , , , , , , , and 1 other author(s). CCS, page 764-778. ACM, (2021)SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things., , , , and . ICC, page 2792-2797. IEEE, (2022)Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing., , , , and . SERVICES, page 19. IEEE, (2021)Social Networks Based Robust Federated Learning for Encrypted Traffic Classification., , , , , , and . ICC, page 4937-4942. IEEE, (2023)Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin., , , and . SMC, page 1928-1934. IEEE, (2014)