Author of the publication

Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage.

, , and . Int. J. Comput. Sci. Eng., 26 (4): 406-417 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-based collaborative intrusion detection scheme., , , and . Int. J. Comput. Sci. Eng., 26 (4): 418-429 (2023)New proofs of ownership for efficient data deduplication in the adversarial conspiracy model., , and . Int. J. Intell. Syst., 36 (6): 2753-2766 (2021)Blockchain-based cross-user data shared auditing., , , and . Connect. Sci., 34 (1): 83-103 (2022)Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication., , and . SocialSec, volume 1663 of Communications in Computer and Information Science, page 175-198. Springer, (2022)A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features., , , and . MobiSec, volume 1644 of Communications in Computer and Information Science, page 280-291. Springer, (2022)SQL queries over encrypted databases: a survey., , and . Connect. Sci., (December 2024)Optimal Verifiable Data Streaming Under Concurrent Queries., , , , , and . IEEE Trans. Mob. Comput., 23 (5): 5543-5557 (May 2024)Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage., , and . Int. J. Comput. Sci. Eng., 26 (4): 406-417 (2023)Randomized deduplication with ownership management and data sharing in cloud storage., , , and . J. Inf. Secur. Appl., (2020)Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage., , , and . FCS, volume 879 of Communications in Computer and Information Science, page 168-176. Springer, (2018)