Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme., , , , and . Future Gener. Comput. Syst., (2014)Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy., , and . J. Inf. Secur. Appl., (2019)Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing., , and . KSII Trans. Internet Inf. Syst., 13 (2): 1043-1063 (2019)Identity-based public auditing for cloud storage systems against malicious auditors via blockchain., , , and . Sci. China Inf. Sci., 62 (3): 32104:1-32104:16 (2019)Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy., , and . FCS, volume 879 of Communications in Computer and Information Science, page 121-137. Springer, (2018)Identity-based provable data possession revisited: Security analysis and generic construction., , , , , , and . Comput. Stand. Interfaces, (2017)A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography., , , and . J. Medical Systems, 39 (3): 24 (2015)Secure and efficient privacy-preserving public auditing scheme for cloud storage., , , and . Comput. Electr. Eng., 40 (5): 1703-1713 (2014)Cryptanalysis of an integrity checking scheme for cloud data sharing., , , , and . J. Inf. Secur. Appl., (2015)Cloud data auditing with designated verifier., , and . Frontiers Comput. Sci., 8 (3): 503-512 (2014)