Author of the publication

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.

, , , , , , , , and . Hum. centric Comput. Inf. Sci., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1923-1928. IEEE, (2018)Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism., , , , , and . IEEE Internet Things J., 7 (9): 8513-8524 (2020)Deep Machine Learning Histopathological Image Analysis for Renal Cancer Detection., , , , , and . ICCAI, page 657-663. ACM, (2022)Iris Cancellable Template Generation Based on Indexing-First-One Hashing., , , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 450-463. Springer, (2016)Security analysis of GCM for communication., , , and . Secur. Commun. Networks, 7 (5): 854-864 (2014)New differential cryptanalysis results for the lightweight block cipher BORON., , , and . J. Inf. Secur. Appl., (2022)Document level polarity classification with attention gated recurrent unit., , , , and . ICOIN, page 7-12. IEEE, (2018)MASHA - Low Cost Authentication with a New Stream Cipher., , , , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 63-78. Springer, (2011)Security Mediated Certificateless Signatures., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 459-477. Springer, (2007)Performance Analysis of an Fuzzy Logic Based LEACH Protocol., , and . ICSCA, page 33-37. ACM, (2019)