Author of the publication

Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.

, , , , and . Comput. Electr. Eng., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User centric three-factor authentication protocol for cloud-assisted wearable devices., , , , , and . Int. J. Commun. Syst., (2019)A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques., , and . IJDSN, (2015)A two-factor authenticated key exchange protocol based on RSA with dynamic passwords., , , and . Int. J. Embed. Syst., 7 (3/4): 257-265 (2015)Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage., , , , and . Comput. Electr. Eng., (2016)VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel., , , , , and . Peer-to-Peer Netw. Appl., 10 (4): 995-1007 (2017)Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms., , and . Secur. Commun. Networks, (2021)A Risk Analysis Framework for Social Engineering Attack Based on User Profiling., , , , , and . J. Organ. End User Comput., 32 (3): 37-49 (2020)A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing., , and . Fundam. Informaticae, 157 (1-2): 201-220 (2018)Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks., , , , and . Wirel. Commun. Mob. Comput., (2018)Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants., , and . Int. J. Netw. Secur., 18 (2): 393-396 (2016)