Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data., , , , , and . IEEE Trans. Serv. Comput., 16 (2): 1011-1022 (March 2023)Provably Secure (Broadcast) Homomorphic Signcryption., , , and . Int. J. Found. Comput. Sci., 30 (4): 511-529 (2019)Multi-authority security framework for scalable EHR systems., , , and . Int. J. Medical Eng. Informatics, 8 (4): 390-408 (2016)Controllable software licensing system for sub-licensing., , , , and . J. Inf. Secur. Appl., (2022)Blockchain-based deduplication with arbitration and incentives., , , , , and . IET Inf. Secur., 16 (6): 401-416 (2022)Collusion resistant multi-authority access control scheme with privacy protection for personal health records., , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (8): 101677 (September 2023)Structured encryption for knowledge graphs., , , , , and . Inf. Sci., (2022)Fully Secure Lightweight Certificateless Signature Scheme for IIoT., , , , and . IEEE Access, (2019)Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example., , , , and . IEEE Netw., 35 (6): 240-246 (2021)HUCDO: A Hybrid User-centric Data Outsourcing Scheme., , , , , , , , , and 1 other author(s). ACM Trans. Cyber Phys. Syst., 4 (3): 35:1-35:23 (2020)