Author of the publication

DABKE: Secure deniable attribute-based key exchange framework.

, , , , , , and . Journal of Computer Security, 27 (2): 259-275 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving and Secure Sharing of PHR in the Cloud., , , and . J. Medical Systems, 40 (12): 267:1-267:13 (2016)CP-ABE With Constant-Size Keys for Lightweight Devices., , , , and . IEEE Trans. Information Forensics and Security, 9 (5): 763-771 (2014)Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation., , , , , and . IEEE Trans. Information Forensics and Security, 12 (3): 676-688 (2017)Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs., , and . IEEE Trans. Information Forensics and Security, 9 (1): 5-13 (2014)Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption., , and . IEEE Trans. Information Forensics and Security, 11 (2): 247-257 (2016)Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud., , , and . IEEE Trans. Information Forensics and Security, 13 (8): 2101-2113 (2018)BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication., , , and . IEEE Trans. Information Forensics and Security, 10 (12): 2643-2652 (2015)Vulnerabilities of an ECC-based RFID authentication scheme., , , , and . Security and Communication Networks, 8 (17): 3262-3270 (2015)Loss-tolerant authentication with digital signatures., , and . Security and Communication Networks, 7 (11): 2054-2062 (2014)Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing., , , and . Future Generation Comp. Syst., (2018)