Author of the publication

Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost.

, , , and . WCI, page 564-572. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proxy visible re-encryption scheme with application to e-mail forwarding., and . SIN, page 212-217. ACM, (2017)Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing., , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 66-77. Springer, (2015)Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data., and . Int. J. Cloud Comput., 4 (4): 317-334 (2015)Pixel co-ordinate-based secret image sharing scheme with constant size shadow images., and . Comput. Electr. Eng., (2021)A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage., and . ICDCIT, volume 14501 of Lecture Notes in Computer Science, page 133-148. Springer, (2024)Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System., and . IEEE SCC, page 474-481. IEEE Computer Society, (2009)Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model., , and . SSCC, volume 746 of Communications in Computer and Information Science, page 215-225. Springer, (2017)Provable data possession scheme with constant proof size for outsourced data in public cloud., and . ICACCI, page 1662-1667. IEEE, (2013)Blockchain-based decentralised access control scheme for dynamic hierarchies., and . Int. J. Inf. Comput. Secur., 16 (3/4): 324-354 (2021)A Ringer-Based Throttling Approach to Mitigate DDoS Attacks., , and . SSCC, volume 746 of Communications in Computer and Information Science, page 95-108. Springer, (2017)