Author of the publication

A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter.

, , , , , and . Concurr. Comput. Pract. Exp., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selection of Heart-Biometric Templates for Fusion., , , and . IEEE Access, (2017)An adaptive gamma correction for image enhancement., , , , and . EURASIP J. Image Video Process., (2016)A Dynamic Histogram Equalization for Image Contrast Enhancement., , , and . IEEE Trans. Consumer Electron., 53 (2): 593-600 (2007)Secure crowd-sensing protocol for fog-based vehicular cloud., , , , , and . Future Gener. Comput. Syst., (2021)A Reliable Skin Detection Using Dempster-Shafer Theory of Evidence., , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 764-779. Springer, (2009)Image Contrast Enhancement Based on Block-Wise Intensity-Pair Distribution with Two Expansion Forces., , and . CIARP, volume 4225 of Lecture Notes in Computer Science, page 247-256. Springer, (2006)Identifying Impact Criteria for Software Requirement Verification and Validation Tools Selection., and . CSCI, page 1926-1930. IEEE, (2022)A TDMA Scheme for Mobile Sensor Networks.. IJDSN, (2013)L-Boost: Identifying Offensive Texts From Social Media Post in Bengali., , , , , and . IEEE Access, (2021)An Industry-4.0-Complaint Sustainable Bitcoin Model Through Optimized Transaction Selection and Sustainable Block Integration., , , , , and . IEEE Trans. Ind. Informatics, 18 (12): 9162-9172 (2022)