Author of the publication

Towards Secure Private Image Matching.

, , , , , , and . GPC, volume 9663 of Lecture Notes in Computer Science, page 301-315. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud., , , , , and . KSII Trans. Internet Inf. Syst., 13 (11): 5692-5716 (2019)Robust scheme to protect authentication code of message/image documents in cloud computing., , , , , , and . ICNC, page 1-5. IEEE Computer Society, (2016)An Efficient and Secure Scheme for Dynamic Shared Data in Cloud., , , , , and . CSAE, page 155:1-155:6. ACM, (2019)Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System., , , , , , , and . IEEE Access, (2020)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , and . IAS, page 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , and . IAS, page 61-66. IEEE, (2015)An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage., , , , , , and . BigDataSecurity/HPSC/IDS, page 412-417. IEEE, (2016)Privacy-Preserving Image Retrieval in IoT-Cloud., , , , , , and . Trustcom/BigDataSE/ISPA, page 799-806. IEEE, (2016)Web application database protection from SQLIA using permutation encoding., , , , , , and . ICISS, page 13-21. ACM, (2021)Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment., , , , , , and . BigDataSecurity/HPSC/IDS, page 146-151. IEEE, (2016)