Author of the publication

New Approach for Privacy-Aware Location-Based Service Communications.

, , , and . Wireless Personal Communications, 101 (2): 1057-1073 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient conditionally anonymous ring signature in the random oracle model., , and . Theor. Comput. Sci., (2012)An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext., , , and . Int. J. Netw. Secur., 15 (3): 161-170 (2013)Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud., , , , and . IACR Cryptol. ePrint Arch., (2023)A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures., , , , and . IEEE Access, (2019)Universally composable asymmetric group key agreement protocol., , , and . ICICS, page 1-6. IEEE, (2015)TriFSS: Secure Trigonometric Function Evaluation via Function Secret Sharing., , , , and . ICC, page 1585-1590. IEEE, (2023)Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud., , , , and . HPCC/DSS/SmartCity/DependSys, page 1525-1530. IEEE, (2022)Fine-Grained Authorized Secure Deduplication with Dynamic Policy., , , and . AIS&P (1), volume 14509 of Lecture Notes in Computer Science, page 16-32. Springer, (2023)New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group., , and . ARES, page 746-751. IEEE Computer Society, (2008)Digital measurement of human proximity to electrical power circuit by a novel amplitude-shift-keying radio-frequency receiver., , , and . ISCAS (1), page 576-579. IEEE, (2005)