From post

A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios.

, , и . ICISS, том 7093 из Lecture Notes in Computer Science, стр. 374-378. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cooperative security administration in multi-security-domain environments using a variant of deontic logic., , , и . Sci. Iran., 19 (3): 635-653 (2012)Access control enforcement on outsourced data ensuring privacy of access control policies., , и . HPCS, стр. 491-497. IEEE, (2011)Access control aware data retrieval for secret sharing based database outsourcing., , и . Distributed Parallel Databases, 34 (4): 505-534 (2016)Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants., , , , и . IACR Cryptol. ePrint Arch., (2022)AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems., и . SECURWARE, стр. 31-36. IEEE Computer Society, (2009)DSCA: an inline and adaptive application identification approach in encrypted network traffic., , и . ICCSP, стр. 39-43. ACM, (2019)k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing., , и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 263-273. Springer, (2012)An Access Control Framework for Pervasive Computing Environments., , и . PSC, стр. 97-103. CSREA Press, (2006)Security Enhancement for a Low Computation Cost User Authentication Scheme., , и . SECRYPT, стр. 5-8. INSTICC Press, (2006)An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments., , и . AICCSA, стр. 1097-1100. IEEE Computer Society, (2006)