Author of the publication

A Distributed Ledger Management Mechanism for Storing and Selling Private Data.

, , , , and . DSC, page 1-8. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyberbullying detection using parent-child relationship between comments., , , and . iiWAS, page 325-334. ACM, (2016)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree., , , and . SECRYPT, page 37-49. SciTePress, (2011)Single-Path Authenticated-Encryption Scheme Based on Universal Hashing., and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 94-109. Springer, (2002)Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection., and . Information Hiding, volume 1174 of Lecture Notes in Computer Science, page 257-264. Springer, (1996)Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System., , , , and . PRIMA, volume 5044 of Lecture Notes in Computer Science, page 134-145. Springer, (2007)Privacy-aware cloud-based input method editor., and . ICCC, page 209-213. IEEE, (2014)Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones., and . NTMS, page 1-5. IEEE, (2015)How to sign multiple versions of digital documents., and . IWBIS, page 133-136. IEEE, (2017)Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance., and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 59-73. Springer, (2000)