Author of the publication

TwinCloud: A Client-Side Encryption Solution for Secure Sharing on Clouds Without Explicit Key Management.

, , and . CoRR, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TwinCloud: Secure cloud sharing without explicit key management., , and . CNS, page 581-585. IEEE, (2016)Towards Usable Solutions to Graphical Password Hotspot Problem., , , , and . COMPSAC (2), page 318-323. IEEE Computer Society, (2009)978-0-7695-3726-9.The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks., , , and . IEEE Trans. Computers, 63 (11): 2866-2879 (2014)Maximizing lifetime of event-unobservable wireless sensor networks., , , and . Comput. Stand. Interfaces, 33 (4): 401-410 (2011)Leveraging human computation for pure-text Human Interaction Proofs., and . Int. J. Hum. Comput. Stud., (2016)Mobility Helps Energy Balancing in Wireless Networks., , and . MILCOM, page 293-298. IEEE, (2013)A Survey of Visual Sensor Network Platforms, , , and . Multimedia Tools and Applications, 60 (3): 689-726 (October 2012)Johnny in internet café: user study and exploration of password autocomplete in web browsers., , and . Digital Identity Management, page 33-42. ACM, (2011)A New Design of Privilege Management Infrastructure with Binding Signature Semantics., and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 306-313. Springer, (2004)Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs., , , and . CCWC, page 774-779. IEEE, (2020)