Author of the publication

A Cloud-User Access Control Mechanism Based on Data Masking.

, , and . ICGEC, page 165-168. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding timestamps to the secure electronic auction protocol., , and . Data Knowl. Eng., 40 (2): 155-162 (2002)Flexible RFID location system based on artificial neural networks for medical care facilities., , , and . SIGBED Review, 6 (2): 12 (2009)The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain., , and . Des. Codes Cryptogr., 36 (1): 53-67 (2005)An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks., , and . IJDSN, (2015)Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage., , and . ICS, volume 1013 of Communications in Computer and Information Science, page 599-607. Springer, (2018)Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery., , and . Informatica, 28 (2): 375-386 (2017)Novel full-search schemes for speeding up image coding using vector quantization., and . Real Time Imaging, 10 (2): 95-102 (2004)A novel key management scheme for dynamic multicast communications., , and . Int. J. Commun. Syst., 22 (1): 53-66 (2009)A user authentication system using back-propagation network., , and . Neural Comput. Appl., 14 (3): 243-249 (2005)A new remote user authentication scheme for multi-server architecture., , and . Future Gener. Comput. Syst., 19 (1): 13-22 (2003)