Author of the publication

Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage.

, , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1753-1769 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-Aware Device Scheduling for Joint Federated Learning in Edge-assisted Internet of Agriculture Things., , , , and . WCNC, page 1140-1145. IEEE, (2022)Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing., , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2913-2924 (July 2023)Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems., , , , and . INFOCOM, page 31-40. IEEE, (2022)Simulation Study of a Spider-Like Robot Based on Leg Reorganization., , , , , and . RCAR, page 1374-1378. IEEE, (2021)Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 4 (3): 241-252 (2020)Privacy-preserving searchable encryption in the intelligent edge computing., , , , , and . Comput. Commun., (2020)A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects., , , , , and . IEEE Internet Things J., 10 (18): 16225-16237 (September 2023)A Behavior Decision Method Based on Reinforcement Learning for Autonomous Driving., , , , and . IEEE Internet Things J., 9 (24): 25386-25394 (2022)Autonomous Platoon Control With Integrated Deep Reinforcement Learning and Dynamic Programming., , , and . IEEE Internet Things J., 10 (6, March 15): 5476-5489 (2023)CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service., , , , , and . IEEE Internet Things J., 1 (1): 46-57 (2014)