Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network., , , and . PST, page 385-387. IEEE Computer Society, (2017)A Combined Solution for Conjunctive Keyword Search, Phrase Search and Auditing for Encrypted Cloud Storage., and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 938-941. IEEE Computer Society, (2016)Fast Phrase Search for Encrypted Cloud Storage., and . IEEE Trans. Cloud Comput., 7 (4): 1002-1012 (2019)Scanning for Viruses on Encrypted Cloud Storage., and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 954-959. IEEE Computer Society, (2016)A collusion attack on the fuzzy vault scheme., and . ISeCure, 1 (1): 27-34 (2009)An improved watermarking technique for multi-user, multi-right environments., , and . Multimedia Tools Appl., 42 (2): 161-181 (2009)A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services., and . CSCloud, page 253-259. IEEE Computer Society, (2015)An Efficient Conjunctive Keyword and Phase Search Scheme for Encrypted Cloud Storage Systems., and . CLOUD, page 508-515. IEEE Computer Society, (2015)Computation and Search over Encrypted XML Documents., and . BigData Congress, page 631-634. IEEE Computer Society, (2015)On efficient decoding for the Fuzzy Vault scheme., and . ISSPA, page 454-459. IEEE, (2012)