Author of the publication

Efficient and secure searchable encryption protocol for cloud-based Internet of Things.

, , , and . J. Parallel Distrib. Comput., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complementing Computational Protocol Analysis with Formal Specifications., , , and . Formal Aspects in Security and Trust, volume 173 of IFIP, page 129-144. Springer, (2004)Digital droplets: Microsoft SkyDrive forensic data remnants., and . Future Generation Comp. Syst., 29 (6): 1378-1394 (2013)The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols., , and . Computer Communications, 29 (15): 2788-2797 (2006)Data Recovery from Proprietary Formatted Cctv Hard Disks., , and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 213-223. Springer, (2013)Building the Next Generation of Cyber Security Professionals., and . ECIS, (2014)Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept., and . TrustCom, page 935-942. IEEE Computer Society, (2014)A survey of information security incident handling in the cloud., and . Computers & Security, (2015)Dropbox analysis: Data remnants on user machines., and . Digital Investigation, 10 (1): 3-18 (2013)Cloud storage forensics: ownCloud as a case study., and . Digital Investigation, 10 (4): 287-299 (2013)User profiling in intrusion detection: A review., , and . J. Network and Computer Applications, (2016)