Author of the publication

Secure proof of storage with deduplication for cloud storage systems.

, , , and . Multim. Tools Appl., 76 (19): 19363-19378 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reliable adaptive forwarding approach in named data networking., , , , and . Future Gener. Comput. Syst., (2019)Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks., and . IEEE/ACM Trans. Netw., 22 (1): 16-26 (2014)A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 405-412. Springer, (2009)Password typos resilience in honey encryption., , and . ICOIN, page 593-598. IEEE, (2017)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , and . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems., and . IEEE Trans. Parallel Distributed Syst., 22 (7): 1214-1221 (2011)Special issue on V2X communications and networks., , , and . J. Commun. Networks, 19 (3): 205-208 (2017)Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage., , , and . IEEE Trans. Cloud Comput., 10 (2): 1008-1020 (2022)Secure deduplication with reliable and revocable key management in fog computing., , , and . Peer-to-Peer Netw. Appl., 12 (4): 850-864 (2019)Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query., , and . IEEE Trans. Inf. Forensics Secur., (2023)