Author of the publication

Simultaneous authentication and secrecy in identity-based data upload to cloud.

, , , , and . Clust. Comput., 16 (4): 845-859 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proxy Provable Data Possession with General Access Structure in Public Clouds., and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 283-300. Springer, (2015)PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds., , , , and . Future Gener. Comput. Syst., (2018)Blockchain-based multi-party proof of assets with privacy preservation., , , and . Inf. Sci., (2021)Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography., , , and . Comput. Networks, (2017)Provable Data Possession with Outsourced Data Transfer., , , , and . IEEE Trans. Serv. Comput., 14 (6): 1929-1939 (2021)VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT., , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3316-3326 (2022)Privacy-Preserving Federated Learning in Fog Computing., , , , , and . IEEE Internet Things J., 7 (11): 10782-10793 (2020)Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT., , , and . IEEE Internet Things J., 9 (16): 15138-15149 (2022)ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack., , , , and . Comput. Stand. Interfaces, (2021)Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain., , , and . IEEE Access, (2019)