Author of the publication

A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience.

, , , , and . Security and Communication Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification and Control of Nonlinear Systems Using Neural Networks: A Singularity-Free Approach., , , and . IEEE Trans. Neural Netw. Learning Syst., 30 (9): 2696-2706 (2019)Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach., , , and . INFOCOM, page 1454-1462. IEEE, (2008)Performance analysis of incremental relaying based on partial selection in multi-source multi-relay networks., , , , and . WCSP, page 1-6. IEEE, (2011)High definition video intra-only coding based on node-cell macroblock pixel structure and 2-D interleaved DCT., , and . ICIP, page 1681-1684. IEEE, (2011)Quantization scheme for high definition video coding based on node-cell pixel structure., , and . BMSB, page 1-4. IEEE, (2012)A two-phase utility maximization framework for wireless medium access control., and . IEEE Trans. Wireless Communications, 6 (12): 4299-4207 (2007)Rate distortion optimized curve determination for curved wavelet image coding., , , and . ICIP, page 2829-2832. IEEE, (2009)Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System., , , , , and . IEEE Access, (2019)Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing., and . IEEE Access, (2019)Efficient and privacy-aware attribute-based data sharing in mobile cloud computing., , and . J. Ambient Intelligence and Humanized Computing, 9 (4): 1039-1048 (2018)