Author of the publication

Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers.

, , and . SmartCity, page 975-981. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack., , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 116-128. Springer, (2007)Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID., , , , , and . J. Inf. Hiding Multim. Signal Process., 5 (4): 642-648 (2014)Secure broadcasting in large networks., and . Comput. Commun., 21 (3): 279-283 (1998)Password-based user authentication and key distribution protocols for client-server applications., and . J. Syst. Softw., 72 (1): 97-103 (2004)On the Security of Chien's Ultralightweight RFID Authentication Protocol., , and . IEEE Trans. Dependable Secur. Comput., 8 (2): 315-317 (2011)Data embedding in image-media using weight-function on modulo operations., , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme., , and . IEEE Trans. Dependable Secur. Comput., 6 (2): 159-160 (2009)Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices.. IEEE Communications Letters, 5 (2): 61-63 (2001)A Gen2-Based RFID Authentication Protocol for Security and Privacy., and . IEEE Trans. Mob. Comput., 8 (8): 1052-1062 (2009)On Private-Key Cryptosystems Based on Product Codes., and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 68-79. Springer, (1998)