Author of the publication

An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.

, , , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture., , , , , , and . AINA Workshops, page 373-380. IEEE Computer Society, (2016)An Efficient Two-Party ECDSA Scheme for Cryptocurrencies., , , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)Secure computation for data privacy., and . SecureComm, page 58-62. IEEE, (2007)HEMIN: A Cryptographic Approach for Private k-NN Classification., , and . DMIN, page 500-505. CSREA Press, (2008)A cryptography based privacy preserving solution to mine cloud data., , and . Bangalore Compute Conf., page 14:1-14:4. ACM, (2010)VeriBlock: A Novel Blockchain Framework based on Verifiable Computing and Trusted Execution Environment., , , , , and . COMSNETS, page 1-6. IEEE, (2020)A Novel Multi Verifier Device Attestation Scheme for Swarm of Devices., , and . AINA Workshops, page 124-129. IEEE Computer Society, (2018)Enterprise Post Quantum Cryptography Migration Tools., , , and . COMSNETS, page 327-329. IEEE, (2024)WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques., , , , , and . ICISS, volume 13146 of Lecture Notes in Computer Science, page 185-197. Springer, (2021)PrivFlow: Secure and Privacy Preserving Serverless Workflows on Cloud., , , , and . CCGrid, page 447-458. IEEE, (2023)