Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry., , , and . Internet Things, (December 2023)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , and . IAS, page 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , and . IAS, page 61-66. IEEE, (2015)An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage., , , , , , and . BigDataSecurity/HPSC/IDS, page 412-417. IEEE, (2016)Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data., , , , and . COMPSAC, page 1397-1398. IEEE, (2021)Efficient encrypted image retrieval in IoT-cloud with multi-user authentication., , , , , , and . Int. J. Distributed Sens. Networks, (2018)Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control., , , , , and . J. Sens. Actuator Networks, 13 (1): 12 (February 2024)Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing., , , , , and . Secur. Commun. Networks, (2017)Towards Secure Private Image Matching., , , , , , and . GPC, volume 9663 of Lecture Notes in Computer Science, page 301-315. Springer, (2016)Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud., , , , , , , and . ICSPCC, page 1-6. IEEE, (2020)