Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OFF-ApexNet on Micro-expression Recognition System., , , , and . CoRR, (2018)Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , and . Hum. centric Comput. Inf. Sci., (2015)Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128., , , and . J. Cryptogr. Eng., 13 (3): 265-281 (September 2023)Learning Age From Gait: A Survey., , , , and . IEEE Access, (2021)A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms., , , and . IEEE Access, (2020)OFF-ApexNet on micro-expression recognition system., , , , and . Signal Process. Image Commun., (2019)Proxy Re-encryption with Keyword Search: New Definitions and Algorithms., , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes., , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 100-105. Springer, (2008)Security models for delegated keyword searching within encrypted contents., , , and . J. Internet Serv. Appl., 3 (2): 233-241 (2012)Efficient encryption with keyword search in mobile networks., , , , and . Secur. Commun. Networks, 5 (12): 1412-1422 (2012)