Follow
Syed Taqi Ali
Title
Cited by
Cited by
Year
Phishshield: a desktop application to detect phishing webpages through heuristic approach
RS Rao, ST Ali
Procedia Computer Science 54, 147-156, 2015
852015
A computer vision technique to detect phishing attacks
RS Rao, ST Ali
2015 Fifth International Conference on Communication Systems and Network …, 2015
702015
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA
VB Chenam, ST Ali
Computer Standards & Interfaces 81, 103603, 2022
292022
Detecting DDoS attacks in cloud computing using ANN and black hole optimization
GS Kushwah, ST Ali
2017 2nd International Conference on Telecommunication and Networks (TEL-NET …, 2017
252017
A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT
A Rajagopalan, M Jagga, A Kumari, ST Ali
2017 3rd international conference on Computational Intelligence …, 2017
242017
Distributed denial of service attacks detection in cloud computing using extreme learning machine
GS Kushwah, ST Ali
International Journal of Communication Networks and Distributed Systems 23 …, 2019
202019
Ciphertext policy-hiding attribute-based encryption
UC Yadav, ST Ali
2015 International Conference on Advances in Computing, Communications and …, 2015
172015
Dynamic policy attribute based encryption and its application in generic construction of multi-keyword search
BB Gupta, ST Ali
International Journal of E-Services and Mobile Applications (IJESMA) 11 (4 …, 2019
132019
MPoWS: Merged proof of ownership and storage for block level deduplication in cloud storage
S Mishra, S Singh, ST Ali
2018 9th international conference on computing, communication and networking …, 2018
132018
Short attribute-based group signature without random oracles with attribute anonymity
ST Ali, BB Amberker
Security in Computing and Communications: International Symposium, SSCC 2013 …, 2013
112013
A comparative survey of searchable encryption schemes
N Pramanick, ST Ali
2017 8th International Conference on Computing, Communication and Networking …, 2017
102017
RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage
S Mishra, S Singh, ST Ali
2018 9th International Conference on Computing, Communication and Networking …, 2018
92018
Dynamic attribute based group signature with attribute anonymity and tracing in the standard model
ST Ali, BB Amberker
Security, Privacy, and Applied Cryptography Engineering: Third International …, 2013
92013
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment
VB Chenam, ST Ali
Journal of Information Security and Applications 72, 103377, 2023
72023
Attribute-based group signature without random oracles with attribute anonymity
ST Ali, BB Amberker
International Journal of Information and Computer Security 6 (2), 109-132, 2014
62014
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model
ST Ali, BB Amberker
International Journal of Applied Cryptography 3 (2), 148-165, 2014
62014
ISEkFT: An IBE-based searchable encryption scheme with k-keyword fuzzy search trapdoor
BB Gupta, ST Ali
Journal of Information Technology Research (JITR) 12 (3), 133-153, 2019
52019
Searchable encryption with pattern matching for securing data on cloud server
N Pramanick, ST Ali
2017 8th International Conference on Computing, Communication and Networking …, 2017
52017
Expressive key-policy attribute-based constant-size signature
S Rani, ST Ali
2017 ISEA Asia Security and Privacy (ISEASP), 1-4, 2017
42017
Mitigating DDoS attack using random integer factorization
ST Ali, A Sultana, A Jangra
2016 Fourth International Conference on Parallel, Distributed and Grid …, 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–20