Author of the publication

Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage.

, , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1753-1769 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive and Dynamic Security in AI-Empowered 6G: From an Energy Efficiency Perspective., , , , and . IEEE Commun. Stand. Mag., 5 (3): 80-88 (2021)Guest Editorial Special Issue on Cybertwin-Driven 6G: Architectures, Methods, and Applications., , , , , and . IEEE Internet Things J., 8 (22): 16191-16194 (2021)Achieving Accountable and Efficient Data Sharing in Industrial Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 17 (2): 1416-1427 (2021)Efficient and Anonymous Authentication With Succinct Multi-Subscription Credential in SAGVN., , , and . IEEE Trans. Intell. Transp. Syst., 23 (3): 2863-2873 (2022)Fine-grained data access control with attribute-hiding policy for cloud-based IoT., , , , , and . Comput. Networks, (2019)Provable data transfer from provable data possession and deletion in cloud storage., , , and . Comput. Stand. Interfaces, (2017)FRUIT: A Blockchain-Based Efficient and Privacy-Preserving Quality-Aware Incentive Scheme., , , , , and . IEEE J. Sel. Areas Commun., 40 (12): 3343-3357 (2022)Blockchain-Based Credential Management for Anonymous Authentication in SAGVN., , , , and . IEEE J. Sel. Areas Commun., 40 (10): 3104-3116 (2022)Privacy-Enhancing Fog Computing and Its Applications, , and . Springer Briefs in Electrical and Computer Engineering Springer, (2018)Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3002-3018 (July 2023)