Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain., , and . IJDSN, (2019)Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search., , and . Symmetry, 9 (6): 89 (2017)A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction., , , and . KSII Trans. Internet Inf. Syst., 11 (9): 4197-4219 (2017)Efficient key insulated attribute based signature without bilinear pairings for mobile communications., and . Automatic Control and Computer Sciences, 51 (3): 159-166 (2017)An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing., and . J. Cloud Comput., (2016)A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing., , and . IEEE Access, (2017)A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability., , , , and . KSII Trans. Internet Inf. Syst., 12 (4): 1832-1853 (2018)A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud., , and . KSII Trans. Internet Inf. Syst., 10 (5): 2394-2406 (2016)A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks., and . Wirel. Pers. Commun., 95 (2): 1215-1228 (2017)A data privacy protection scheme for Internet of things based on blockchain., , , , , and . Trans. Emerg. Telecommun. Technol., (2021)