Author of the publication

Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding.

, , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 339-348. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control., , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 88-103. Springer, (2017)On the Security of a Searchable Anonymous Attribute Based Encryption., and . ICMC, volume 655 of Communications in Computer and Information Science, page 16-25. (2017)Securing Digital Image from Malicious Insider Attacks., and . IJCVIP, 8 (2): 49-58 (2018)On the Security of än efficient and complete remote user authentication scheme". CoRR, (2008)Improving security and efficiency of time-bound access to outsourced data., , , and . COMPUTE, page 9:1-9:8. ACM, (2013)A Simple and Secure Authentication and Key Establishment Protocol., and . ICETET, page 844-849. IEEE Computer Society, (2008)Data Deduplication Scheme with Multiple Key Servers in Public Clouds., and . ANTS, page 272-277. IEEE, (2021)GIDS: Anomaly Detection Using Generative Adversarial Networks., , and . SSCC, volume 1364 of Communications in Computer and Information Science, page 244-251. Springer, (2020)Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage., and . COMSNETS, page 237-241. IEEE, (2021)PAC: Privacy preserving proxy re-encryption for access control in public cloud., and . Inf. Secur. J. A Glob. Perspect., 31 (5): 612-627 (2022)