Author of the publication

Scanning for Viruses on Encrypted Cloud Storage.

, and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 954-959. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Backward Link Authentication For RFID tags., , and . RFID-TA, page 348-352. IEEE, (2011)New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)., and . IACR Cryptology ePrint Archive, (2008)Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs., , , and . Pattern Recognit., 43 (8): 2732-2752 (2010)Adaptive ROC-based ensembles of HMMs applied to anomaly detection., , , and . Pattern Recognit., 45 (1): 208-230 (2012)A Sybil Resistant IoT Trust Model Using Blockchains., and . iThings/GreenCom/CPSCom/SmartData, page 1017-1026. IEEE, (2018)A new image encryption algorithm based on a chaotic DNA substitution method., and . ICC, page 1011-1015. IEEE, (2012)DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems., and . WCNC, page 1497-1502. IEEE, (2009)Cross-Scenario Performance Modelling for Big Data Ecosystems., and . HCI (37), volume 12217 of Lecture Notes in Computer Science, page 211-228. Springer, (2020)Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions., , , and . Clust. Comput., 19 (3): 1227-1242 (2016)Forward-link authentication for RFIDs., and . PIMRC, page 2644-2649. IEEE, (2010)