Author of the publication

Flexible Yet Secure De-duplication Service for Enterprise Data on Cloud Storage.

, , , and . ICCCRI, page 37-44. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification., and . IAS, page 6-11. IEEE, (2014)Towards flexible credential verification in mobile ad-hoc networks., and . POMC, page 58-65. ACM, (2002)Policy-based Management for Body-Sensor Networks., , , , , , , , , and 1 other author(s). BSN, page 92-98. Springer, (2007)Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study., , , and . WF-IoT, page 1-7. IEEE, (2022)Vesta: A secure and autonomic system for pervasive healthcare., , , and . PervasiveHealth, page 1-8. IEEE, (2009)Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications., , , and . GLOBECOM, page 1-6. IEEE, (2019)SEABASS: Symmetric-keychain encryption and authentication for building automation systems., , , and . WF-IoT, page 219-224. IEEE, (2018)An implementation experience of domain management in marlin., and . Digital Rights Management Workshop, page 29-38. ACM, (2009)GPS Signal Authentication Using a Chameleon Hash Keychain., , , , , and . Critical Infrastructure Protection, volume 636 of IFIP Advances in Information and Communication Technology, page 209-226. Springer, (2021)Experiences and Lessons Learned from Real-World Projects in Software Engineering Subject., , , , , , , and . CSEE&T, page 173-177. IEEE, (2023)