Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advances to Homomorphic and Searchable Encryption, and . Springer, (2023)Customized Authorization Process for Cloud Computing and IoT Using Attribute-Based Encryption., , , , and . ECAI, page 1-4. IEEE, (2022)Optimization strategies for data collections used in evaluating dynamic signature authentication systems., and . COMM, page 343-346. IEEE, (2012)A novel architecture for authenticating scalable resources in hybrid cloud., , , , , and . COMM, page 251-254. IEEE, (2016)Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint., and . COMM, page 139-144. IEEE, (2020)A Hybrid Searchable Encryption Scheme for Cloud Computing., and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 85-96. Springer, (2018)Authentication Protocol for Intelligent Cars using Fog Computing and Software-Defined Networking., , and . ECAI, page 1-6. IEEE, (2021)On Artificial Neural Network used in Cloud Computing Security - A Survey., and . ECAI, page 1-6. IEEE, (2018)Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain., and . Sensors, 23 (3): 1371 (February 2023)A Searchable Encryption Scheme Based on Elliptic Curves., and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 810-821. Springer, (2020)