Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incentive compatible and anti-compounding of wealth in proof-of-stake., , , , , , and . Inf. Sci., (2020)An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment., , , , and . Complex., (2019)A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols., , and . Secur. Commun. Networks, (2020)New efficient identity based encryption without pairings., and . J. Ambient Intelligence and Humanized Computing, 10 (4): 1561-1570 (2019)RoughDroid: Operative Scheme for Functional Android Malware Detection., and . Secur. Commun. Networks, (2018)A generic method to construct zero-difference balanced functions., , and . Cryptogr. Commun., 10 (4): 591-609 (2018)On the LFSRization of a Class of FCSR Automata., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 434-440 (2015)Permutation Polynomials over Zpn and Their Randomness., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (3): 913-915 (2017)KD-GAN: An effective membership inference attacks defence framework., , , , , and . Int. J. Intell. Syst., 37 (11): 9921-9935 (2022)A dynamic and hierarchical access control for IoT in multi-authority cloud storage., , and . J. Netw. Comput. Appl., (2020)