Author of the publication

Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control.

, , , , , and . GLOBECOM, page 6801-6806. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spam Detection: Increasing Accuracy with A Hybrid Solution., and . IS Management, 23 (1): 57-67 (2006)A Framework for Trusted Wireless Sensor Networks., and . DBSec, volume 144 of IFIP, page 371-384. Kluwer/Springer, (2004)Surviving in Cyberspace: A Game Theoretic Approach., , and . J. Commun., 7 (6): 436-450 (2012)Problem Analyses and Recommendations in DRM Security Policies., , , and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 165-178. Springer, (2008)Do you care if a computer says sorry?: user experience design through affective messages., , and . Conference on Designing Interactive Systems, page 731-740. ACM, (2012)Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control., , , , , and . GLOBECOM, page 6801-6806. IEEE, (2023)Access Control Requirements for Preventing Insider Threats., and . ISI, volume 3975 of Lecture Notes in Computer Science, page 529-534. Springer, (2006)Access control mechanisms for inter-organizational workflow., , and . SACMAT, page 66-74. ACM, (2001)A Security Analysis on Apple Pay., and . EISIC, page 160-163. IEEE Computer Society, (2016)Binding Identities and Attributes using Digitally Signed Certificates., and . ACSAC, page 120-127. IEEE Computer Society, (2000)