Author of the publication

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing.

, , and . CloudCom, page 371-378. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing., , and . CloudCom, page 371-378. IEEE Computer Society, (2015)Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion).. Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 215-218. Springer, (2016)Enterprise IoT security and scalability: how unikernels can improve the status Quo., , and . UCC, page 292-297. ACM, (2016)Advances in Security in Computing and Communications., , , , , , , , , and 8 other author(s). CoRR, (2017)Malicious Clients in Distributed Secret Sharing Based Storage Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)The Archistar Secret-Sharing Backup Proxy., , and . ARES, page 88:1-88:8. ACM, (2017)