Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Updatable Storage Access Control System for EHRs in the Cloud., , , , , and . IEEE Trans. Serv. Comput., 16 (4): 2939-2953 (July 2023)SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space., , , , , , , , and . CoRR, (2020)A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes., , , , and . CoRR, (2021)New Secure Sparse Inner Product with Applications to Machine Learning., , , , , , and . CoRR, (2022)Blockchain-based access control for dynamic device management in microgrid., , , and . Peer-to-Peer Netw. Appl., 15 (3): 1653-1668 (2022)VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder., , , , , , , and . CoRR, (2022)An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search., , , and . Comput. J., 66 (9): 2265-2278 (September 2023)Dual Access Control for Cloud-Based Data Storage and Sharing., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1036-1048 (2022)Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity., , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 4101-4117 (September 2023)