Author of the publication

Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".

, , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 282-289. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 282-289. Springer, (2017)Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process., , , , and . ICFET, page 108-112. ACM, (2020)Data embedding in image-media using weight-function on modulo operations., , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)Predictive pixel differencing expansion in data reversibility scheme., , , and . ICUIMC, page 17:1-17:7. ACM, (2012)Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity., , , and . Signal Image Video Process., 18 (6-7): 5043-5059 (August 2024)A Security System Based on Door Movement Detecting., , , , , and . ECC (1), volume 297 of Advances in Intelligent Systems and Computing, page 155-163. Springer, (2014)A Flexible Framework for Malicious Open XML Document Detection based on APT Attacks., , and . INFOCOM Workshops, page 2005-2006. IEEE, (2019)Active One-Time Password Mechanism for User Authentication., , , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 464-471. Springer, (2013)Secure Protocol for Identity-based Provable Data Possession in Cloud Storage., , , , and . ICCCS, page 327-331. IEEE, (2019)A dynamic identity-based user authentication scheme for remote login systems., , and . Secur. Commun. Networks, 8 (18): 3372-3382 (2015)