Author of the publication

New Algorithms for Secure Outsourcing of Modular Exponentiations.

, , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 541-556. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compensation of Requantization and Interpolation Errors in MPEG-2 to H.264 Transcoding., , and . IEEE Trans. Circuits Syst. Video Techn., 18 (3): 314-325 (2008)Efficient Motion Re-Estimation With Rate-Distortion Optimization for MPEG-2 to H.264/AVC Transcoding., and . IEEE Trans. Circuits Syst. Video Techn., 20 (2): 262-274 (2010)Fast block size prediction for MPEG-2 to H.264/AVC transcoding., , and . ICASSP, page 1029-1032. IEEE, (2008)Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications., , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 548-567. Springer, (2015)On the Power of Public-key Function-Private Functional Encryption., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 585-593. (2016)Bit-rate estimation for bit-rate reduction H.264/AVC video transcoding in wireless networks., , , and . ISWPC, page 464-467. IEEE, (2008)Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting., , and . IEEE Access, (2022)Post-Quantum Era Privacy Protection for Intelligent Infrastructures., , , , , , , , , and . IEEE Access, (2021)Together or Alone: The Price of Privacy in Collaborative Learning., , and . Proc. Priv. Enhancing Technol., 2019 (2): 47-65 (2019)Intelligent Ubiquitous Network Accessibility for Wireless-Powered MEC in UAV-Assisted B5G., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 2801-2813 (2021)