Publication Venue For Interactive three-dimensional visualization of network intrusion detection data for machine learning 2020 A multistage protocol for aggregated queries in distributed cloud databases with privacy protection 2019 A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance 2019 An efficient linkable group signature for payer tracing in anonymous cryptocurrencies 2019 Smart Fog Based Workflow for Traffic Control Networks 2019 Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing 2018 Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models 2018 Searchain: Blockchain-based private keyword search in decentralized storage 2017 Cloud data integrity checking with an identity-based auditing mechanism from RSA 2016 Principles and experimentations of self-organizing embedded agents allowing learning from demonstration in ambient robotics 2016 A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing 2015 Aligning ontology-based development with service oriented systems 2014 On the security of auditing mechanisms for secure cloud storage 2014 Identity-based data storage in cloud computing 2013 An effective data aggregation based adaptive long term CPU load predictions mechanism on computational grid 2012 Analysis of Business Process Integration in Web Service Context 2007 Autonomous service level agreement negotiation for service composition provisions 2007
Publication Venue For Interactive three-dimensional visualization of network intrusion detection data for machine learning 2020 A multistage protocol for aggregated queries in distributed cloud databases with privacy protection 2019 A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance 2019 An efficient linkable group signature for payer tracing in anonymous cryptocurrencies 2019 Smart Fog Based Workflow for Traffic Control Networks 2019 Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing 2018 Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models 2018 Searchain: Blockchain-based private keyword search in decentralized storage 2017 Cloud data integrity checking with an identity-based auditing mechanism from RSA 2016 Principles and experimentations of self-organizing embedded agents allowing learning from demonstration in ambient robotics 2016 A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing 2015 Aligning ontology-based development with service oriented systems 2014 On the security of auditing mechanisms for secure cloud storage 2014 Identity-based data storage in cloud computing 2013 An effective data aggregation based adaptive long term CPU load predictions mechanism on computational grid 2012 Analysis of Business Process Integration in Web Service Context 2007 Autonomous service level agreement negotiation for service composition provisions 2007