Author of the publication

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.

, , , and . Secur. Commun. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 405-412. Springer, (2009)Password typos resilience in honey encryption., , and . ICOIN, page 593-598. IEEE, (2017)Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks., and . IEEE/ACM Trans. Netw., 22 (1): 16-26 (2014)Special issue on V2X communications and networks., , , and . J. Commun. Networks, 19 (3): 205-208 (2017)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , and . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)A reliable adaptive forwarding approach in named data networking., , , , and . Future Gener. Comput. Syst., (2019)Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage., , , and . IEEE Trans. Cloud Comput., 10 (2): 1008-1020 (2022)Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems., and . IEEE Trans. Parallel Distributed Syst., 22 (7): 1214-1221 (2011)Secure deduplication with reliable and revocable key management in fog computing., , , and . Peer-to-Peer Netw. Appl., 12 (4): 850-864 (2019)Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query., , and . IEEE Trans. Inf. Forensics Secur., (2023)