Author of the publication

An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services.

, , , , and . ICCCS, page 1-8. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncovering Hidden Instructions in Armv8-A Implementations., and . HASP@MICRO, page 3:1-3:9. ACM, (2020)Can You Explain That? Lucid Explanations Help Human-AI Collaborative Image Retrieval., , , , and . HCOMP, page 153-161. AAAI Press, (2019)LiteEx: A Lightweight Feature Extraction Tool for Captured Network Traces., , , and . COMSNETS, page 243-251. IEEE, (2023)Long Term Electricity Load Forecasting for Garhwal Region of Uttarakhand Using Artificial Neural Network., , , and . IC3I, page 955-959. IEEE, (2023)Role of Neural Network, Fuzzy, and loT in Integrating Artificial Intelligence as a Cyber Security System., , , , , , and . IC3I, page 2599-2609. IEEE, (2023)Robust visual path following for heterogeneous mobile platforms., , , , and . ICRA, page 2431-2437. IEEE, (2010)Automated Mosaics via Topology Inference., , and . IEEE Computer Graphics and Applications, 22 (2): 44-54 (2002)Software canaries: software-based path delay fault testing for variation-aware energy-efficient design., and . ISLPED, page 159-164. ACM, (2014)Recovery-driven design: a power minimization methodology for error-tolerant processor modules., , , and . DAC, page 825-830. ACM, (2010)Stochastic computation., , , and . DAC, page 859-864. ACM, (2010)