Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation., and . IET Inf. Secur., 12 (1): 25-33 (2018)A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks., and . Int. J. Inf. Comput. Secur., 12 (2/3): 112-129 (2020)Privacy preservation with RTT-based detection for wireless mesh networks., and . IET Inf. Secur., 14 (4): 391-400 (2020)Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability., , , , and . J. Cloud Comput., 13 (1): 45 (December 2024)Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem., and . Int. J. Inf. Secur. Priv., 12 (3): 27-41 (2018)Multi-level Data Integrity Model with Dual Immutable Digital Key Based Forensic Analysis in IoT Network., , and . SN Comput. Sci., 5 (1): 90 (January 2024)ZSS Signature-Based Audit Message Verification Process for Cloud Data Integrity., , , , and . IEEE Access, (2023)Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols., , , , , and . ICCCNT, page 1-7. IEEE, (2021)Modular exponentiation with inner product to resist higher-order DPA attacks., , and . Innov. Syst. Softw. Eng., 16 (1): 87-97 (2020)Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation., , and . CoRR, (2022)