Author of the publication

Comprehensive evaluation of key management hierarchies for outsourced data.

, and . Cybersecurity, 2 (1): 8 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Generation of Compact Printable Shellcodes for x86., , and . WOOT @ USENIX Security Symposium, USENIX Association, (2020)Fast Private License Plate Matching Using Symmetric Homomorphic Encryption., and . ANTS, page 1-6. IEEE, (2018)Security and Privacy Issues in Outsourced Personal Health Record., and . Research Advances in Cloud Computing, Springer, (2017)Improving security and efficiency of time-bound access to outsourced data., , , and . COMPUTE, page 9:1-9:8. ACM, (2013)Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud., , and . SSCC, volume 536 of Communications in Computer and Information Science, page 36-44. Springer, (2015)Improved Write Access Control and Stronger Freshness Guarantee to Outsourced Data., and . ICDCN, page 19. ACM, (2017)An Efficient Key Assignment Scheme for Access Control in a Hierarchy., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 205-219. Springer, (2006)Key Establishment Protocols for Secure Mobile Communications: A Selective Survey., and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 344-355. Springer, (1998)A Tool for Visualizing Concurrent C Programs Using Graphs., and . T4E, page 236-237. IEEE Computer Society, (2016)Protocols for Authentication and Key Establishment, and . Springer, (2004)