A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets S Ahmad, KMR Alam, H Rahman, S Tamura 2015 International Conference on Networking Systems and Security (NSysS), 1-5, 2015 | 44 | 2015 |
Clustcrypt: Privacy-preserving clustering of unstructured big data in the cloud SM Zobaed, S Ahmad, R Gottumukkala, MA Salehi 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 14 | 2019 |
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data S Ahmad, SM Zobaed, R Gottumukkala, MA Salehi 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 8 | 2019 |
When do Convolutional Neural Networks Stop Learning? S Ahmad, G Trahan, A Islam arXiv preprint arXiv:2403.02473, 2024 | | 2024 |