Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics., , , , , and . IEEE Trans. Sustain. Comput., 6 (2): 184-196 (2021)Achieving sequenced SQL with log-segmented timestamps., and . Inf. Comput., (October 2023)Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme., , , , , , and . Symmetry, 10 (5): 161 (2018)Correction to: Countering Statistical Attacks in Cloud-Based Searchable Encryption., , , , and . Int. J. Parallel Program., 48 (3): 580 (2020)A look into user's privacy perceptions and data practices of IoT devices., , , and . Inf. Comput. Secur., 29 (4): 573-588 (2021)A Fog-Centric Secure Cloud Storage Scheme., , , , , and . IEEE Trans. Sustain. Comput., 7 (2): 250-262 (2022)Countering Statistical Attacks in Cloud-Based Searchable Encryption., , , , and . Int. J. Parallel Program., 48 (3): 470-495 (2020)Achieving a Sequenced, Relational Query Language with Log-Segmented Timestamps., and . TIME, volume 206 of LIPIcs, page 14:1-14:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)We Don't Give a Second Thought Before Providing Our Information: Understanding Users' Perceptions of Information Collection by Apps in Urban Bangladesh., , , , , and . COMPASS, page 32-43. ACM, (2020)