Syed Taqi Ali

Orcid: 0000-0001-7927-8643

According to our database1, Syed Taqi Ali authored at least 19 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Tree-based quantum anonymous ranking protocol.
Quantum Inf. Process., July, 2024

Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks.
Peer Peer Netw. Appl., May, 2024

A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage.
J. Inf. Secur. Appl., 2024

2023
A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage.
Comput. Commun., November, 2023

Multiparty quantum private comparison based on quantum walks.
Quantum Inf. Process., 2023

A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment.
J. Inf. Secur. Appl., 2023

2022
Secret Key-Based Image Steganography in Spatial Domain.
Int. J. Image Graph., 2022

A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA.
Comput. Stand. Interfaces, 2022

2019
ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor.
J. Inf. Technol. Res., 2019

Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search.
Int. J. E Serv. Mob. Appl., 2019

Distributed denial of service attacks detection in cloud computing using extreme learning machine.
Int. J. Commun. Networks Distributed Syst., 2019

2018
RCDSD: RSA Based Cross Domain Secure Deduplication on Cloud Storage.
Proceedings of the 9th International Conference on Computing, 2018

MPoWS: Merged Proof of Ownership and Storage for Block Level Deduplication in Cloud Storage.
Proceedings of the 9th International Conference on Computing, 2018

2015
Ciphertext policy-hiding attribute-based encryption.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Attribute-based group signature without random oracles with attribute anonymity.
Int. J. Inf. Comput. Secur., 2014

Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model.
Int. J. Appl. Cryptogr., 2014

2013
A dynamic constant size attribute-based group signature scheme with attribute anonymity.
Int. J. Inf. Priv. Secur. Integr., 2013

Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013


  Loading...