Author of the publication

Efficient and Verifiable Proof of Replication with Fast Fault Localization.

, , , , , and . INFOCOM, page 1-10. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder., , , , , , , and . CoRR, (2022)An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage., , , and . IEEE Trans. Inf. Forensics Secur., (2022)Privacy preserving search services against online attack., , , , , and . Comput. Secur., (2020)Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 94-105 (2018)Blockchain-based access control for dynamic device management in microgrid., , , and . Peer-to-Peer Netw. Appl., 15 (3): 1653-1668 (2022)Offline/Online lattice-based ciphertext policy attribute-based encryption., , , , , and . J. Syst. Archit., (2022)Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1064-1077 (2022)Dual Access Control for Cloud-Based Data Storage and Sharing., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1036-1048 (2022)Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity., , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 4101-4117 (September 2023)