Author of the publication

Time-bound key-aggregate encryption for cloud storage.

, , , and . Secur. Commun. Networks, 9 (13): 2059-2069 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks., , and . J. Inf. Sci. Eng., 34 (1): 155-170 (2018)Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks., and . Int. J. Netw. Secur., 8 (2): 166-168 (2009)On security of a more efficient and secure dynamic ID-based remote user authentication scheme., , , and . ISDA, page 1371-1375. IEEE, (2010)A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks., , and . Comput. Commun., 31 (12): 2803-2814 (2008)Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 282-289. Springer, (2017)Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process., , , , and . ICFET, page 108-112. ACM, (2020)A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps., , and . IEEE Access, (2018)A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System., , , and . J. Medical Systems, 39 (11): 144:1-144:11 (2015)A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System., , and . J. Medical Systems, 40 (5): 117:1-117:15 (2016)Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services., , and . IOV, volume 8662 of Lecture Notes in Computer Science, page 367-375. Springer, (2014)