Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing fully homomorphic encryption to implement secure medical computation in smart cities., , , , and . Pers. Ubiquitous Comput., 21 (5): 831-839 (2017)A Survey on Access Control in Fog Computing., , , , , and . IEEE Commun. Mag., 56 (2): 144-149 (2018)A Review on VANET Research: Perspective of Recent Emerging Technologies., , , , , , , , and . IEEE Access, (2022)Ultrafusion: Optimal Fuzzy Fusion in Land-Cover Segmentation Using Multiple Panchromatic Satellite Images., , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2024)Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues., , , , , , and . ACM Comput. Surv., 47 (4): 65:1-65:34 (2015)Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions., , , , , , , , and . J. Netw. Comput. Appl., (2015)Attribute-based data access control in mobile cloud computing: Taxonomy and open issues., , , , and . Future Gener. Comput. Syst., (2017)Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables., , and . IEEE Trans. Parallel Distributed Syst., 29 (5): 999-1012 (2018)Recent advances in cloud data centers toward fog data centers., , , and . Concurr. Comput. Pract. Exp., (2019)Privacy-Preserving and Security in SDN-Based IoT: A Survey., , , , and . IEEE Access, (2023)