Phishshield: a desktop application to detect phishing webpages through heuristic approach RS Rao, ST Ali Procedia Computer Science 54, 147-156, 2015 | 86 | 2015 |
A computer vision technique to detect phishing attacks RS Rao, ST Ali 2015 Fifth International Conference on Communication Systems and Network …, 2015 | 72 | 2015 |
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA VB Chenam, ST Ali Computer Standards & Interfaces 81, 103603, 2022 | 29 | 2022 |
Detecting DDoS attacks in cloud computing using ANN and black hole optimization GS Kushwah, ST Ali 2017 2nd International Conference on Telecommunication and Networks (TEL-NET …, 2017 | 26 | 2017 |
A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT A Rajagopalan, M Jagga, A Kumari, ST Ali 2017 3rd international conference on Computational Intelligence …, 2017 | 24 | 2017 |
Distributed denial of service attacks detection in cloud computing using extreme learning machine GS Kushwah, ST Ali International Journal of Communication Networks and Distributed Systems 23 …, 2019 | 20 | 2019 |
Ciphertext policy-hiding attribute-based encryption UC Yadav, ST Ali 2015 International Conference on Advances in Computing, Communications and …, 2015 | 17 | 2015 |
Dynamic policy attribute based encryption and its application in generic construction of multi-keyword search BB Gupta, ST Ali International Journal of E-Services and Mobile Applications (IJESMA) 11 (4 …, 2019 | 13 | 2019 |
MPoWS: Merged proof of ownership and storage for block level deduplication in cloud storage S Mishra, S Singh, ST Ali 2018 9th international conference on computing, communication and networking …, 2018 | 13 | 2018 |
Short attribute-based group signature without random oracles with attribute anonymity ST Ali, BB Amberker Security in Computing and Communications: International Symposium, SSCC 2013 …, 2013 | 11 | 2013 |
A comparative survey of searchable encryption schemes N Pramanick, ST Ali 2017 8th International Conference on Computing, Communication and Networking …, 2017 | 10 | 2017 |
RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage S Mishra, S Singh, ST Ali 2018 9th International Conference on Computing, Communication and Networking …, 2018 | 9 | 2018 |
Dynamic attribute based group signature with attribute anonymity and tracing in the standard model ST Ali, BB Amberker Security, Privacy, and Applied Cryptography Engineering: Third International …, 2013 | 9 | 2013 |
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment VB Chenam, ST Ali Journal of Information Security and Applications 72, 103377, 2023 | 7 | 2023 |
Attribute-based group signature without random oracles with attribute anonymity ST Ali, BB Amberker International Journal of Information and Computer Security 6 (2), 109-132, 2014 | 6 | 2014 |
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model ST Ali, BB Amberker International Journal of Applied Cryptography 3 (2), 148-165, 2014 | 6 | 2014 |
ISEkFT: An IBE-based searchable encryption scheme with k-keyword fuzzy search trapdoor BB Gupta, ST Ali Journal of Information Technology Research (JITR) 12 (3), 133-153, 2019 | 5 | 2019 |
Searchable encryption with pattern matching for securing data on cloud server N Pramanick, ST Ali 2017 8th International Conference on Computing, Communication and Networking …, 2017 | 5 | 2017 |
Expressive key-policy attribute-based constant-size signature S Rani, ST Ali 2017 ISEA Asia Security and Privacy (ISEASP), 1-4, 2017 | 4 | 2017 |
Mitigating DDoS attack using random integer factorization ST Ali, A Sultana, A Jangra 2016 Fourth International Conference on Parallel, Distributed and Grid …, 2016 | 4 | 2016 |