Author of the publication

A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter.

, , , , , and . Concurr. Comput. Pract. Exp., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve., , and . Wirel. Commun. Mob. Comput., 10 (5): 662-671 (2010)SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks., , , , , , and . Concurr. Comput. Pract. Exp., (2018)Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks., , , , and . IEEE Trans. Ind. Informatics, 14 (2): 799-813 (2018)From sensing to alerting: a pathway of RESTstful messaging in ambient assisted living., , , , , and . IEEE Wirel. Commun., 23 (2): 102-110 (2016)Pairing-Based Secure Timing Synchronization for Heterogeneous Sensor Networks., , and . GLOBECOM, page 148-152. IEEE, (2008)Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" J. Parallel Distrib. Comput 70 (2010) 858-870., and . J. Parallel Distributed Comput., 70 (11): 1174 (2010)Privacy preserving secure data exchange in mobile P2P cloud healthcare environment., , , , , and . Peer-to-Peer Netw. Appl., 9 (5): 894-909 (2016)Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks., , and . WiMob, page 423-428. IEEE Computer Society, (2008)A prediction system of Sybil attack in social network using deep-regression model., , , , and . Future Gener. Comput. Syst., (2018)Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems., , , , , and . IACR Cryptology ePrint Archive, (2010)