Author of the publication

Improved secure dynamic key management scheme with access control in user hierarchy.

, and . DICTAP, page 220-225. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hyperlocal Based Support and Information Diffusion in Social Media., , , and . ICIT, page 406-411. IEEE, (2019)Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption., and . ICISTM, volume 54 of Communications in Computer and Information Science, page 133-144. Springer, (2010)Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 175-189. Springer, (2011)Improved secure dynamic key management scheme with access control in user hierarchy., and . DICTAP, page 220-225. IEEE, (2012)