Author of the publication

New efficient constructions of verifiable data streaming with accountability.

, , , and . Ann. des Télécommunications, 74 (7-8): 483-499 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption., , , and . Int. J. Embed. Syst., 10 (1): 62-70 (2018)New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage., , and . Int. J. Netw. Secur., 22 (5): 885-896 (2020)New efficient constructions of verifiable data streaming with accountability., , , and . Ann. des Télécommunications, 74 (7-8): 483-499 (2019)Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing., , , and . IEEE Access, (2020)A new scheme for improving the utilisation of nested-cloud resources., , and . Int. J. Embed. Syst., 11 (2): 170-181 (2019)A parallelized network traffic classification framework based on selective ensemble and diversity measures., , and . J. High Speed Networks, 22 (1): 35-42 (2016)An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU., , , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 420-431. Springer, (2020)Application of Grid Technologies in Linux Host Intrusion Detection System., and . CSO (1), page 13-17. IEEE Computer Society, (2009)A result correctness verification mechanism for cloud computing based on MapReduce., , and . Int. J. Embed. Syst., 11 (4): 526-539 (2019)Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method., , , , , and . J. Univers. Comput. Sci., 25 (3): 203-221 (2019)