Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment., , , and . IEEE Trans. Cloud Comput., 10 (1): 216-233 (2022)A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks., , , , and . SRDS, page 164-175. IEEE, (2021)A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control., , and . SIN, page 11-18. ACM, (2017)Post-Quantum Era Privacy Protection for Intelligent Infrastructures., , , , , , , , , and . IEEE Access, (2021)A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context., , , and . IEEE Trans. Serv. Comput., 16 (3): 1647-1661 (May 2023)Cloud Data Provenance using IPFS and Blockchain Technology., , and . SCC@AsiaCCS, page 5-12. ACM, (2019)A Secure Re-encryption Scheme for Data Sharing in Unreliable Cloud Environment., and . SERVICES, page 75-80. IEEE Computer Society, (2016)Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption., , and . IEEE Trans. Cloud Comput., 11 (1): 25-43 (January 2023)An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation., , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 569-590. Springer, (2020)PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor., , and . IEEE ANTS, page 1-6. IEEE, (2015)