Author of the publication

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.

, , , , , , , , and . Hum. centric Comput. Inf. Sci., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure., , and . Symmetry, 11 (7): 913 (2019)A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications., , , , and . ICITCS, page 1-5. IEEE Computer Society, (2015)TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain., , and . IEEE Access, (2021)An Enhanced Public Key Infrastructure., , and . ICITCS, page 1-4. IEEE Computer Society, (2013)Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , and . Hum. centric Comput. Inf. Sci., (2015)OFF-ApexNet on Micro-expression Recognition System., , , , and . CoRR, (2018)Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes., , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 100-105. Springer, (2008)Proxy Re-encryption with Keyword Search: New Definitions and Algorithms., , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)Integrated Neural Network and Machine Vision Approach For Leather Defect Classification., , , , and . CoRR, (2019)One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control., , and . TrustCom, page 905-912. IEEE, (2022)