Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment., , , and . IEEE Trans. Cloud Comput., 10 (1): 216-233 (2022)A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks., , , , and . SRDS, page 164-175. IEEE, (2021)A Multi-Client Searchable Encryption Scheme for IoT Environment., , , , , , and . CoRR, (2023)A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control., , and . SIN, page 11-18. ACM, (2017)Post-Quantum Era Privacy Protection for Intelligent Infrastructures., , , , , , , , , and . IEEE Access, (2021)A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context., , , and . IEEE Trans. Serv. Comput., 16 (3): 1647-1661 (May 2023)A Secure Re-encryption Scheme for Data Sharing in Unreliable Cloud Environment., and . SERVICES, page 75-80. IEEE Computer Society, (2016)Cloud Data Provenance using IPFS and Blockchain Technology., , and . SCC@AsiaCCS, page 5-12. ACM, (2019)NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN., , , , and . Comput. J., 67 (4): 1572-1589 (2024)Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption., , and . IEEE Trans. Cloud Comput., 11 (1): 25-43 (January 2023)