Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of a Certificateless Public Key Encryption with Keyword Search., , , , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 191-197. Springer, (2017)Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme., , , , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 178-183. Springer, (2018)A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems., , , , , and . IEEE Access, (2019)A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code., , , and . IEEE Trans. Computers, 60 (6): 813-823 (2011)Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review., , , , , , and . J. Netw. Intell., 3 (1): 16-25 (2018)Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme., , , , and . ICGEC, volume 579 of Advances in Intelligent Systems and Computing, page 199-205. Springer, (2017)Comments on Yu et al's Shared Data Integrity Verification Protocol., , , , and . ECC, volume 682 of Advances in Intelligent Systems and Computing, page 73-78. Springer, (2017)A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks., , , , , , , and . ICGEC, volume 1107 of Advances in Intelligent Systems and Computing, page 468-473. Springer, (2019)SPATE: Small-Group PKI-Less Authenticated Trust Establishment., , , , , , , , , and 3 other author(s). IEEE Trans. Mob. Comput., 9 (12): 1666-1681 (2010)On the Security of Chien's Ultralightweight RFID Authentication Protocol., , and . IEEE Trans. Dependable Secur. Comput., 8 (2): 315-317 (2011)