Author of the publication

An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage.

, , and . J. King Saud Univ. Comput. Inf. Sci., 35 (9): 101745 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seamless channel transition using Bespoke broadcasting scheme for video-on-demand service., and . IEEE Trans. Consumer Electronics, 51 (4): 1313-1318 (2005)Seamless channel transition for cautious harmonic scheme in video data broadcasting., and . IEEE Trans. Consumer Electronics, 52 (3): 719-725 (2006)Generalized conservative staircase data broadcasting protocol for video-on-demand., and . IEEE Trans. Consumer Electronics, 52 (2): 363-370 (2006)Bespoke data broadcasting scheme for popular videos., and . IEEE Trans. Consumer Electronics, 49 (1): 193-197 (2003)Application of neural network for air-fuel ratio identification in spark ignition engine., and . Int. J. Comput. Appl. Technol., 32 (3): 206-215 (2008)Identification of one-zone heat release parameters for SI engine., and . Int. J. Model. Identif. Control., 6 (4): 287-300 (2009)Video Data Delivery using Slotted Patching., , and . J. Netw. Comput. Appl., 32 (3): 660-665 (2009)Request based data delivery in video-on-demand services., , and . IEEE Trans. Consumer Electron., 52 (4): 1318-1324 (2006)Computer vision-based framework for pedestrian movement direction recognition., , and . J. Intell. Fuzzy Syst., 44 (5): 8015-8027 (2023)Comparative analysis of detection and classification of diabetic retinopathy by using transfer learning of CNN based models., , , , and . J. Intell. Fuzzy Syst., 43 (1): 985-999 (2022)