Author of the publication

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.

, , , , , and . J. Inf. Process., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation., , , , , and . J. Inf. Process., 20 (2): 496-507 (2012)Proposal of anonymization dictionary using disclosed statements by business operators., , , , , , and . Internet Things, (2022)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application., , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 53-67 (2013)Homomorphic encryption based cancelable biometrics secure against replay and its related attack., , , , and . ISITA, page 421-425. IEEE, (2012)Efficient construction of secure hyperelliptic discrete logarithm problems., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 292-301. Springer, (1997)Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 214-234. Springer, (2017)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)A key pre-distribution scheme for secure sensor networks using probability density function of node deployment., , , and . SASN, page 69-75. ACM, (2005)Your Health Is Leaked: PPG Waveform Reconstruction Using Stealthily Recorded Physiological Signals., , , , and . EMBC, page 1-4. IEEE, (2023)A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols., , , , , and . ISITA, page 315-319. IEEE, (2016)