Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PAC: Privacy preserving proxy re-encryption for access control in public cloud., and . Inf. Secur. J. A Glob. Perspect., 31 (5): 612-627 (2022)Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control., , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 88-103. Springer, (2017)On the Security of a Searchable Anonymous Attribute Based Encryption., and . ICMC, volume 655 of Communications in Computer and Information Science, page 16-25. (2017)On Aadhaar Identity Management System., , and . CoRR, (2020)GIDS: Anomaly Detection Using Generative Adversarial Networks., , and . SSCC, volume 1364 of Communications in Computer and Information Science, page 244-251. Springer, (2020)Data Deduplication Scheme with Multiple Key Servers in Public Clouds., and . ANTS, page 272-277. IEEE, (2021)Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage., and . COMSNETS, page 237-241. IEEE, (2021)Improving security and efficiency of time-bound access to outsourced data., , , and . COMPUTE, page 9:1-9:8. ACM, (2013)A Simple and Secure Authentication and Key Establishment Protocol., and . ICETET, page 844-849. IEEE Computer Society, (2008)A Novel Remote User Authentication Scheme Through Dynamic Login Identity., , and . IWDC, volume 3326 of Lecture Notes in Computer Science, page 532. Springer, (2004)