Author of the publication

A lightweight delegated private set intersection cardinality protocol.

, , , and . Comput. Stand. Interfaces, (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Morphology Based Feature Identification in Image Processing.. ACFIE, volume 78 of Advances in Intelligent and Soft Computing, page 607-615. (2010)Mixture-State Document Segmentation Using Wavelet-Domain Hidden Markov Tree Models., , , and . WAA, volume 2251 of Lecture Notes in Computer Science, page 230-236. Springer, (2001)CCA-Secure Deterministic Identity-Based Encryption Scheme., , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)Unsupervised Domain Adaptation for Disguised-Gait-Based Person Identification on Micro-Doppler Signatures., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 6448-6460 (2022)A Fast Algorithm for Occlusion Detection and Removal., , , and . ICIP, page 2905-2909. IEEE, (2018)Study on Image Segmentation Algorithm Based on Fuzzy Mathematical Morphology., and . ACFIE, volume 54 of Advances in Soft Computing, page 488-495. (2008)Study on Sign Language Recognition Fusion Algorithm Using FNN.. ACFIE, volume 78 of Advances in Intelligent and Soft Computing, page 617-626. (2010)Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks., and . Int. J. Comput. Sci. Eng., 16 (4): 441-450 (2018)A Study of User Privacy in Android Mobile AR Apps., and . ASE, page 226:1-226:5. ACM, (2022)Dynamic Channel Modeling for an Indoor Scenario at 23.5 GHz., , , , , , and . IEEE Access, (2015)