From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment., , , , , , и . BigDataSecurity/HPSC/IDS, стр. 146-151. IEEE, (2016)Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks., , , и . KSII Trans. Internet Inf. Syst., 13 (12): 6121-6144 (2019)Authentication and Revocation Scheme for VANETs Based on Chinese Remainder Theorem., , , , и . HPCC/SmartCity/DSS, стр. 1541-1547. IEEE, (2019)Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing., , , и . CGC, стр. 282-289. IEEE Computer Society, (2012)Towards Privacy Preserving Mining over Distributed Cloud Databases., , , и . CGC, стр. 130-136. IEEE Computer Society, (2012)Encrypted Remote User Authentication Scheme by Using Smart Card., , , и . WISM, том 7529 из Lecture Notes in Computer Science, стр. 314-323. Springer, (2012)Approximate Keyword-based Search over Encrypted Cloud Data., , , и . ICEBE, стр. 238-245. IEEE Computer Society, (2012)Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data., , , и . APSCC, стр. 263-270. IEEE Computer Society, (2012)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , и . IAS, стр. 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , и . IAS, стр. 61-66. IEEE, (2015)