Author of the publication

Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.

, , , , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 178-183. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps., , and . IEEE Access, (2018)Multilayer Dense Attention Model for Image Caption., , , , and . IEEE Access, (2019)On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags., , , and . J. Supercomput., 74 (1): 65-70 (2018)Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 282-289. Springer, (2017)A Public Auditing Scheme with Data Recovery., , , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 595-602. Springer, (2018)Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique., and . Informatica, 21 (2): 247-258 (2010)Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds., , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 198-205. Springer, (2017)A New Certificate-Based Aggregate Signature Scheme for Wireless Sensor Networks., , , and . J. Inf. Hiding Multim. Signal Process., 9 (5): 1264-1280 (2018)A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism., , , , and . J. Inf. Hiding Multim. Signal Process., 8 (4): 916-928 (2017)Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol., , , , , and . J. Inf. Sci. Eng., 34 (2): 371-390 (2018)