Author of the publication

A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets.

, , , , and . Trans. Emerg. Telecommun. Technol., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Logging as a Service Using Reversible Watermarking., , , , and . FNC/MobiSPC, volume 110 of Procedia Computer Science, page 336-343. Elsevier, (2017)Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs., , and . SSCI, page 1-7. IEEE, (2021)Formal verification and complexity analysis of confidentiality aware textual clinical documents framework., , , , , and . Int. J. Intell. Syst., 37 (12): 10380-10399 (December 2022)(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility., , , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud., , , , , , , , and . Int. J. Distributed Sens. Networks, (2019)Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data., , , , , and . ACM Trans. Internet Techn., 22 (2): 42:1-42:21 (2022)Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions., , , and . Comput. Networks, (2019)Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach., , , and . IEEE Trans. Engineering Management, 67 (4): 1244-1255 (2020)Data trustworthiness in IoT., , , , , and . ICOIN, page 414-419. IEEE, (2018)Using CycleGANs to Generate Realistic STEM Images for Machine Learning., , , and . CoRR, (2023)