Author of the publication

Cycle-walking revisited: consistency, security, and efficiency.

, , , and . Secur. Commun. Networks, 6 (8): 985-992 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SSIR: Secure similarity image retrieval in IoT., , and . Inf. Sci., (2019)New Privacy-Preserving Location Sharing System for Mobile Online Social Networks., , , , and . 3PGCIC, page 214-218. IEEE, (2013)Outsourcing Encryption of Attribute-Based Encryption with MapReduce., , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 191-201. Springer, (2012)Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud., , , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 490-502. Springer, (2012)An efficient and privacy-preserving location sharing mechanism., , , , and . Comput. Stand. Interfaces, (2016)DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping., , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 155-174. Springer, (2019)K-Anonymity Algorithm Based on Improved Clustering., , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 462-476. Springer, (2018)A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs., , , , , and . Digit. Commun. Networks, 9 (5): 1180-1189 (October 2023)Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT., , , , , and . IEEE Internet Things J., 10 (24): 21322-21336 (December 2023)Xmark: Dynamic Software Watermarking Using Collatz Conjecture., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2859-2874 (2019)