Author of the publication

Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.

, , , , , , and . IAS, page 73-78. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device., and . Cryptogr., 3 (3): 24 (2019)VPPCS: VANET-Based Privacy-Preserving Communication Scheme., , , and . IEEE Access, (2020)Encrypted Remote User Authentication Scheme by Using Smart Card., , , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 314-323. Springer, (2012)Approximate Keyword-based Search over Encrypted Cloud Data., , , and . ICEBE, page 238-245. IEEE Computer Society, (2012)Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction., , , and . IEEE Access, (2019)Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks., , , and . KSII Trans. Internet Inf. Syst., 13 (12): 6121-6144 (2019)Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment., , , , , , and . BigDataSecurity/HPSC/IDS, page 146-151. IEEE, (2016)Authentication and Revocation Scheme for VANETs Based on Chinese Remainder Theorem., , , , and . HPCC/SmartCity/DSS, page 1541-1547. IEEE, (2019)Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing., , , and . CGC, page 282-289. IEEE Computer Society, (2012)Towards Privacy Preserving Mining over Distributed Cloud Databases., , , and . CGC, page 130-136. IEEE Computer Society, (2012)