Author of the publication

Bloom Filter Based Privacy Preserving Deduplication System.

, , , , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 17-34. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things., , , , and . COMPSAC, page 1237-1242. IEEE, (2023)Secure proof of ownership for deduplicated cloud storage system., , and . Int. J. Inf. Comput. Secur., 21 (1/2): 205-228 (2023)Securing SQL with Access Control for Database as a Service Model., and . ICTCS, page 104:1-104:6. (2016)Bloom Filter Based Privacy Preserving Deduplication System., , , , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 17-34. Springer, (2018)Secure and Efficient Key Management for Deduplicated Cloud Storage Systems., , , , , and . SIN, page 1-6. IEEE, (2023)Secure and Efficient Traffic Obfuscation Scheme for Deduplicated Cloud Storage., and . Autom. Control. Comput. Sci., 58 (2): 153-165 (April 2024)Versatility and Unix semantics in namespace unification., , , , , , and . ACM Trans. Storage, 2 (1): 74-105 (2006)Powering Europe's Energy Transition: Financial Viability of a Full-Scale Meshed HVDC Grid and Hybrid Offshore Assets in the North Sea., , , , and . ISGT EUROPE, page 1-6. IEEE, (2023)Cryptographic File Systems Performance: What You Don't Know Can Hurt You., , and . IEEE Security in Storage Workshop, page 47-61. IEEE Computer Society, (2003)Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage., , , , and . Autom. Control. Comput. Sci., 54 (4): 358-370 (2020)