Author of the publication

Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems.

, , , , , and . IEEE Trans. Ind. Informatics, 17 (6): 4279-4287 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Big Data Privacy with MapReduce., , and . Encyclopedia of Big Data Technologies, Springer, (2019)CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing., , , and . IACR Cryptology ePrint Archive, (2012)BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing., , , , , and . IEEE Trans. Ind. Informatics, 16 (6): 4187-4195 (2020)A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud., , , and . IEEE Trans. Parallel Distributed Syst., 25 (2): 363-373 (2014)HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications., , , and . IEEE Trans. Parallel Distributed Syst., 26 (2): 455-466 (2015)A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud., , , , , and . J. Comput. Syst. Sci., 80 (5): 1008-1020 (2014)Edge computing empowered anomaly detection framework with dynamic insertion and deletion schemes on data streams., and . World Wide Web, 25 (5): 2163-2183 (2022)SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud., , , , , and . Concurr. Comput. Pract. Exp., 25 (18): 2561-2576 (2013)HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing., , , , and . Concurr. Comput. Pract. Exp., 28 (3): 646-660 (2016)A data-operation model based on partial vector space for batch processing in workflow., , , and . Concurr. Comput. Pract. Exp., 23 (16): 1936-1950 (2011)