From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust scheme to protect authentication code of message/image documents in cloud computing., , , , , , и . ICNC, стр. 1-5. IEEE Computer Society, (2016)EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud., , , , , и . KSII Trans. Internet Inf. Syst., 13 (11): 5692-5716 (2019)An Efficient and Secure Scheme for Dynamic Shared Data in Cloud., , , , , и . CSAE, стр. 155:1-155:6. ACM, (2019)Secure and Fast Remote Application-Based Authentication Dragonfly Using an LED Algorithm in Smart Buildings., , , и . ICAIIC, стр. 509-517. IEEE, (2024)An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage., , , , , , и . BigDataSecurity/HPSC/IDS, стр. 412-417. IEEE, (2016)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , и . IAS, стр. 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , и . IAS, стр. 61-66. IEEE, (2015)Privacy-Preserving Image Retrieval in IoT-Cloud., , , , , , и . Trustcom/BigDataSE/ISPA, стр. 799-806. IEEE, (2016)Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment., , , , , , и . BigDataSecurity/HPSC/IDS, стр. 146-151. IEEE, (2016)Web application database protection from SQLIA using permutation encoding., , , , , , и . ICISS, стр. 13-21. ACM, (2021)