Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier., , and . IEEE Access, (2022)Certificateless Homomorphic Signature Scheme for Network Coding., , , , and . IEEE/ACM Trans. Netw., 28 (6): 2615-2628 (2020)Comment on Ä Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage"., , , and . IEEE Trans. Serv. Comput., 15 (5): 2633-2634 (2022)A survey of research hotspots and frontier trends of recommendation systems from the perspective of knowledge graph., , and . Expert Syst. Appl., (2021)Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property., , , and . Clust. Comput., 25 (1): 337-349 (2022)Toward Usable Cloud Storage Auditing, Revisited., , , , and . IEEE Syst. J., 16 (1): 693-700 (2022)Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited., , , and . Appl. Math. Comput., (2020)Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC., , , , , and . IEEE Access, (2019)Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment., , , and . IEEE Access, (2022)Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment., , , , and . IEEE Access, (2018)