Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption., , , and . IEEE Syst. J., 15 (4): 5233-5244 (2021)Source delay in mobile ad hoc networks., , , and . Ad Hoc Networks, (2015)MHB*T based dynamic data integrity auditing in cloud storage., , and . Clust. Comput., 24 (3): 2115-2132 (2021)InputGen: A Tool for Automatic Generation of Prototype Inputs to Support Rapid Requirements Validation., , and . ICSE Companion, page 122-126. IEEE, (2023)Implementation of a Federated Large-Scale Remote Sensing Data Sharing Platform., , , , , , and . IGARSS, page 5771-5774. IEEE, (2021)Probing-based two-hop relay with limited packet redundancy., , , , and . HPSR, page 96-101. IEEE, (2012)Efficient identity-based signature over NTRU lattice., , , and . Frontiers Inf. Technol. Electron. Eng., 17 (2): 135-142 (2016)Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s)., , , and . J. Inf. Secur. Appl., (2019)Optimized byzantine fault tolerant algorithm for improving performance and security with trust values., , , and . IET Blockchain, 4 (1): 1-17 (March 2024)Decision Support in Procuring Requirements for ERP Software., , and . ICYCS, page 1126-1131. IEEE Computer Society, (2008)