Author of the publication

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.

, , , , , , , , and . Comput. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AQE-Net: A Deep Learning Model for Estimating Air Quality of Karachi City from Mobile Images., , , , , , , and . Remote. Sens., 14 (22): 5732 (2022)Secure provenance using an authenticated data structure approach., , , , , and . Comput. Secur., (2018)Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs., , and . Sensors, 23 (17): 7604 (September 2023)A methodology for image annotation of human actions in videos., , , , and . Multim. Tools Appl., 79 (33-34): 24347-24365 (2020)Identity Aging: Efficient Blockchain Consensus., and . CoRR, (2018)Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins., , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 1-12. Springer, (2018)Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data., , , , , and . ACM Trans. Internet Techn., 22 (2): 42:1-42:21 (2022)Aligning Research Resource and Researcher Representation: The eagle-i and VIVO Use Case., , , , , , , , , and . ICBO, volume 833 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)Secure Logging as a Service Using Reversible Watermarking., , , , and . FNC/MobiSPC, volume 110 of Procedia Computer Science, page 336-343. Elsevier, (2017)Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE., , , and . ARES, page 400-407. IEEE Computer Society, (2007)