Author of the publication

oGBAC - A Group Based Access Control Framework for Information Sharing in Online Social Networks.

, , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 100-116 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stackelberg Game Based Edge Computing Resource Management for Mobile Blockchain., , , , , and . ACM TUR-C, page 225-229. ACM, (2020)Security and privacy protocols for perceptual image hashing., , , , , and . Int. J. Sens. Networks, 17 (3): 146-162 (2015)Applying chirp-modulated back-projection to very high resolution spaceborne sliding spotlight SAR data processing., , , and . IGARSS, page 973-975. IEEE, (2017)Topography- and aperture-dependent motion compensation for airborne SAR: A back projection approach., , , , and . IGARSS, page 448-450. IEEE, (2014)Interferometric Phase Characteristics Analysis and Unwrapping Method of Airborne Insar in Low Coherence Areas., , , , and . IGARSS, page 1757-1760. IEEE, (2019)Study on the interaction between the cover source mismatch and texture complexity in steganalysis., , , , , and . Multimedia Tools Appl., 78 (6): 7643-7666 (2019)LEChain: A blockchain-based lawful evidence management scheme for digital forensics., , , and . Future Gener. Comput. Syst., (2021)Lossless Data Hiding Based on Homomorphic Cryptosystem., , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 692-705 (2021)One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud., , , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 350-365. Springer, (2020)Using Randomized Response for Differential Privacy Preserving Data Collection., , and . EDBT/ICDT Workshops, volume 1558 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)