Author of the publication

A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression.

, , and . BigDataService, page 138-146. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User and Event Behavior Analytics on Differentially Private Data for Anomaly Detection., and . BigDataSecurity, page 81-86. IEEE, (2021)Secure image data deduplication through compressive sensing., and . PST, page 569-572. IEEE, (2016)A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression., , and . BigDataService, page 138-146. IEEE Computer Society, (2015)Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation., and . SECRYPT, page 738-747. SCITEPRESS, (2024)PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing., , and . ICISSP, page 838-844. SCITEPRESS, (2024)Proof of Storage for Video Deduplication in the Cloud., , and . BigData Congress, page 499-505. IEEE Computer Society, (2015)Output and Input Data Perturbations for Differentially Private Databases., and . SERVICES, page 376-377. IEEE, (2019)Proof of retrieval and ownership protocols for enterprise-level data deduplication., , and . CASCON, page 81-90. IBM / ACM, (2013)Secure Enterprise Data Deduplication in the Cloud., , and . IEEE CLOUD, page 367-374. IEEE Computer Society, (2013)Anonymous Authentication with a Bi-directional Identity Federation in the Cloud., and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 57-64. Springer, (2016)