Author of the publication

Secure Searchable Public-Key Encryption for Cloud Storage.

, , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 184-195. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forgery Attacks on Chang et al.'s signature scheme with message recovery., , and . IACR Cryptology ePrint Archive, (2004)Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government., , , , and . FCS, volume 1726 of Communications in Computer and Information Science, page 48-68. Springer, (2022)Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors., , , and . IEEE Trans. Cloud Comput., 9 (3): 923-937 (2021)CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors., , , , , and . IEEE Trans. Cloud Comput., 9 (4): 1362-1375 (2021)Efficient multi-receiver identity-based signcryption from lattice assumption., , and . Int. J. Electron. Secur. Digit. Forensics, 10 (1): 20-38 (2018)Formal Verification of Security Protocols: ProVerif and Extensions., , , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 500-512. Springer, (2022)An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things., , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 389-393. Springer, (2023)A Server-Aided Aggregate Verification Signature Scheme from Bilinear Pairing., , and . INCoS, page 503-506. IEEE, (2013)DStore: A Distributed Cloud Storage System Based on Smart Contracts and Blockchain., , , and . ICA3PP (3), volume 11336 of Lecture Notes in Computer Science, page 385-401. Springer, (2018)Blockchain-Based Secure Data Provenance for Cloud Storage., , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 3-19. Springer, (2018)