Author of the publication

Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit.

, , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8079-8089 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8079-8089 (2022)Attack on Recent Homomorphic Encryption Scheme over Integers., , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 269-275. Springer, (2013)Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing., , and . J. Syst. Archit., (2022)Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage., , , , and . INCoS, volume 23 of Lecture Notes on Data Engineering and Communications Technologies, page 445-452. Springer, (2018)Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption., , , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 752-762. Springer, (2018)Privacy-preserving compromised credential checking protocol for account protection., , , and . Comput. Stand. Interfaces, (2024)Parallel private information retrieval protocol with index anonymity for untrusted databases., , , and . J. King Saud Univ. Comput. Inf. Sci., 36 (2): 101903 (February 2024)