Author of the publication

Simultaneous authentication and secrecy in identity-based data upload to cloud.

, , , , and . Clust. Comput., 16 (4): 845-859 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDRM-CapsNet: Capsule Network Based on Deep Dynamic Routing Mechanism for Complex Data., , , , , , and . ICANN (1), volume 11727 of Lecture Notes in Computer Science, page 178-189. Springer, (2019)Continuous-Variable Quantum Network Coding Against Pollution Attacks., , , and . QTOP@NetSys, volume 11413 of Lecture Notes in Computer Science, page 196-206. Springer, (2017)Marine stations real-time monitoring database management., , , and . Geoinformatics, page 1-4. IEEE, (2010)Achieving liability in anonymous communication: Auditing and tracing., , , , , and . Comput. Commun., (2019)Fault-tolerant anti-windup control for hypersonic vehicles in reentry based on ISMDO., , , and . J. Frankl. Inst., 355 (5): 2067-2090 (2018)Continuous estimation of finger joint angles under different static wrist motions from surface EMG signals., , , , and . Biomed. Signal Process. Control., (2014)The asymptotic connectivity of random cognitive radio networks., , , , and . WCNC, page 1685-1690. IEEE, (2013)Secure quantum network coding for controlled repeater networks., , and . Quantum Inf. Process., 15 (7): 2937-2953 (2016)Design and Analysis of e-Government Control: the Green Corridor between Finland and Russia., , , and . Bled eConference, page 18. (2007)Towards a Methodology for Designing E-Government Control Procedures., , and . EGOV, volume 4656 of Lecture Notes in Computer Science, page 56-67. Springer, (2007)