Author of the publication

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.

, , , , , , , and . Cryptogr., 8 (1): 5 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance., , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 477-494. Springer, (2016)Understanding Social Influence in Collective Product Ratings Using Behavioral and Cognitive Metrics., , , , , and . CHI, page 464:1-464:16. ACM, (2022)Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update., , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 39-60. (2016)Secure Replication-Based Outsourced Computation Using Smart Contracts., , , , and . IEEE Trans. Serv. Comput., 16 (5): 3711-3722 (September 2023)Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures., , , , , , , and . Cryptogr., 8 (1): 5 (March 2024)Optimisation of Lightweight Klein Encryption Algorithm With 3 S-box., , and . PerCom Workshops, page 1-5. IEEE, (2020)Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes., , , and . Int. J. Inf. Sec., 17 (5): 533-548 (2018)Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts., , , and . Int. J. Inf. Sec., 17 (4): 463-475 (2018)Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures., , , and . CoRR, (2022)Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing., , , and . Future Gener. Comput. Syst., (2018)