Author of the publication

Securing SQL with Access Control for Database as a Service Model.

, and . ICTCS, page 104:1-104:6. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Digital Image from Malicious Insider Attacks., and . IJCVIP, 8 (2): 49-58 (2018)On the Security of än efficient and complete remote user authentication scheme". CoRR, (2008)Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control., , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 88-103. Springer, (2017)On the Security of a Searchable Anonymous Attribute Based Encryption., and . ICMC, volume 655 of Communications in Computer and Information Science, page 16-25. (2017)PAC: Privacy preserving proxy re-encryption for access control in public cloud., and . Inf. Secur. J. A Glob. Perspect., 31 (5): 612-627 (2022)On Aadhaar Identity Management System., , and . CoRR, (2020)Data Deduplication Scheme with Multiple Key Servers in Public Clouds., and . ANTS, page 272-277. IEEE, (2021)GIDS: Anomaly Detection Using Generative Adversarial Networks., , and . SSCC, volume 1364 of Communications in Computer and Information Science, page 244-251. Springer, (2020)Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage., and . COMSNETS, page 237-241. IEEE, (2021)A Novel Remote User Authentication Scheme Through Dynamic Login Identity., , and . IWDC, volume 3326 of Lecture Notes in Computer Science, page 532. Springer, (2004)