Author of the publication

Outsourced dynamic provable data possession with batch update for secure cloud storage.

, , , , , , and . Future Generation Comp. Syst., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems., , , , and . J. Medical Systems, 39 (6): 62:1-62:8 (2015)An anonymous and efficient remote biometrics user authentication scheme in a multi server environment., , , , and . Frontiers of Computer Science, 9 (1): 142-156 (2015)Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'., , , , and . Wireless Personal Communications, 83 (1): 35-48 (2015)An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks., , , , and . Ad Hoc & Sensor Wireless Networks, 16 (1-3): 29-44 (2012)Cryptanalysis of enhancement on "quantum blind signature based on two-state vector formalism"., and . Quantum Information Processing, 13 (5): 1245-1254 (2014)Digital filter design using root moments for sum-of-all-pass structures from complete and partial specifications., and . IEEE Trans. Signal Processing, 54 (1): 315-324 (2006)Outsourced dynamic provable data possession with batch update for secure cloud storage., , , , , , and . Future Generation Comp. Syst., (2019)Authenticated public key broadcast encryption with short ciphertexts., , , , and . Multimedia Tools Appl., 78 (16): 23399-23414 (2019)A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications., , and . Wireless Personal Communications, 86 (3): 1593-1610 (2016)A constant rounds group key agreement protocol without using hash functions., , , and . Int. Journal of Network Management, 19 (6): 457-464 (2009)