Author of the publication

Secure and Efficient Certificateless Provable Data Possession for Cloud-Based Data Management Systems.

, , , , and . DASFAA (1), volume 12681 of Lecture Notes in Computer Science, page 71-87. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PersonalityGate: A general plug-and-play GNN gate to enhance cascade prediction with personality recognition task., , , , and . Expert Syst. Appl., (2022)Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts., , , and . IEEE Internet Things J., 5 (5): 3580-3593 (2018)Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication., , , and . IEEE Internet Things J., 8 (1): 144-155 (2021)A novel privacy-preserving speech recognition framework using bidirectional LSTM., , , , and . J. Cloud Comput., (2020)HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT., , , and . IPCCC, page 1-7. IEEE, (2019)MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs., , , , and . ICPADS, page 470-479. IEEE, (2019)Intrusion-resilient public cloud auditing scheme with authenticator update., , , and . Inf. Sci., (2020)A novel anonymous secret sharing scheme based on BP Artificial Neural Network., , and . ICNC, page 366-370. IEEE, (2012)RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers., , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 330-344. Springer, (2019)A novel anonymous authentication scheme without cryptography., , and . Trans. Emerg. Telecommun. Technol., 25 (9): 875-880 (2014)