Author of the publication

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.

, , , , , and . ACM Trans. Embedded Comput. Syst., 16 (2): 57:1-57:20 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New attribute-based authentication and its application in anonymous cloud access service., , and . IJWGS, 11 (1): 125-141 (2015)Provably Secure Group Key Management Approach Based upon Hyper-Sphere., , , , , and . IEEE Trans. Parallel Distrib. Syst., 25 (12): 3253-3263 (2014)Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge., , , and . IJAHUC, 20 (4): 262-273 (2015)Advances in secure and intelligent data processing., , , and . Concurrency and Computation: Practice and Experience, 26 (5): 1021-1022 (2014)A Secure Cloud Storage System from Threshold Encryption., , and . INCoS, page 541-545. IEEE, (2013)New Publicly Verifiable Databases with Efficient Updates., , , , and . IEEE Trans. Dependable Sec. Comput., 12 (5): 546-556 (2015)Provably secure user authentication and key agreement scheme for wireless sensor networks., , , , , and . Security and Communication Networks, 9 (16): 3670-3687 (2016)Improved handover authentication and key pre-distribution for wireless mesh networks., , , and . Concurrency and Computation: Practice and Experience, 28 (10): 2978-2990 (2016)Universally Composable RFID Mutual Authentication., , , , and . IEEE Trans. Dependable Sec. Comput., 14 (1): 83-94 (2017)Security and Privacy Techniques for the Industrial Internet of Things., and . Security and Privacy Trends in the Industrial Internet of Thing, Springer, (2019)