Author of the publication

Customized Authorization Process for Cloud Computing and IoT Using Attribute-Based Encryption.

, , , , and . ECAI, page 1-4. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unveiling Threats: Leveraging User Behavior Analysis for Enhanced Cybersecurity., , , and . ECAI, page 1-6. IEEE, (2023)On recommendation systems applied in big data.. ECAI, page 1-6. IEEE, (2016)Fuel Monitoring System based on IoT: Overview and Device Authentication., and . COMM, page 1-4. IEEE, (2022)Security and Cryptographic Challenges for Authentication Based on Biometrics Data., , and . Cryptogr., 2 (4): 39 (2018)A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments., and . Cryptogr., 6 (1): 8 (2022)Blockchain Applications in Computer Communication., and . ECAI, page 1-4. IEEE, (2021)Towards Data Science for Cybersecurity: Machine Learning Advances as Glowing Perspective., and . IntelliSys (2), volume 543 of Lecture Notes in Networks and Systems, page 26-48. Springer, (2022)Blockchain Search Using Searchable Encryption Based on Elliptic Curves., and . AINA (3), volume 451 of Lecture Notes in Networks and Systems, page 471-481. Springer, (2022)Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain., and . Sensors, 23 (3): 1371 (February 2023)A Searchable Encryption Scheme Based on Elliptic Curves., and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 810-821. Springer, (2020)