Author of the publication

A privacy preserving federated learning scheme using homomorphic encryption and secret sharing.

, , , , and . Telecommun. Syst., 82 (3): 419-433 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AKAIoTs: authenticated key agreement for Internet of Things., , , , and . Wireless Networks, 25 (6): 3081-3101 (2019)Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes., , , and . Wireless Personal Communications, 80 (4): 1671-1685 (2015)Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things., , , , and . IEEE Internet of Things Journal, 5 (6): 4926-4944 (2018)A Provably Secure Certificate Based Ring Signature Without Pairing., , and . Int. J. Netw. Secur., 16 (4): 278-285 (2014)An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs., , , and . IEEE Trans. Veh. Technol., 69 (10): 11266-11280 (2020)A group key agreement protocol based on ECDH and short signature., , , and . J. Inf. Secur. Appl., (2023)Traffic data extraction and labeling for machine learning based attack detection in IoT networks., , and . Int. J. Mach. Learn. Cybern., 14 (7): 2317-2332 (July 2023)A cloud data deduplication scheme based on certificateless proxy re-encryption., , , and . J. Syst. Archit., (2020)An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles., , and . J. Syst. Archit., (March 2023)Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information., , and . Quantum Inf. Process., 19 (8): 233 (2020)