Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless multi-signcryption scheme in standard model., , and . Int. J. Grid Util. Comput., 9 (2): 120-127 (2018)Secure data outsourcing scheme in cloud computing with attribute-based encryption., and . IJHPCN, 12 (2): 128-136 (2018)Secure Cloud File System with Attribute Based Encryption., , and . INCoS, page 99-102. IEEE, (2013)Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption., , and . INCoS, page 257-261. IEEE, (2015)Protecting data in cloud environment with attribute-based encryption., and . Int. J. Grid Util. Comput., 6 (2): 91-97 (2015)Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data., , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 211-222. Springer, (2017)More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing., , , , and . 3PGCIC, volume 24 of Lecture Notes on Data Engineering and Communications Technologies, page 293-299. Springer, (2018)Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure., and . SPDE, volume 1268 of Communications in Computer and Information Science, page 625-639. Springer, (2020)Certificateless Multi-signcryption Scheme in Standard Model., , and . INCoS, page 475-479. IEEE, (2016)A Two-Stage Voting-Boosting Technique for Ensemble Learning in Social Network Sentiment Classification., , , , , and . Entropy, 25 (4): 555 (April 2023)