Author of the publication

Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature.

, , and . IIH-MSP, page 566-569. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions., , , and . Comput. Networks, (2019)Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach., , , and . IEEE Trans. Engineering Management, 67 (4): 1244-1255 (2020)(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility., , , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)Formal verification and complexity analysis of confidentiality aware textual clinical documents framework., , , , , and . Int. J. Intell. Syst., 37 (12): 10380-10399 (December 2022)Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data., , , , , and . ACM Trans. Internet Techn., 22 (2): 42:1-42:21 (2022)Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud., , , , , , , , and . Int. J. Distributed Sens. Networks, (2019)Secure Logging as a Service Using Reversible Watermarking., , , , and . FNC/MobiSPC, volume 110 of Procedia Computer Science, page 336-343. Elsevier, (2017)Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs., , and . SSCI, page 1-7. IEEE, (2021)Data trustworthiness in IoT., , , , , and . ICOIN, page 414-419. IEEE, (2018)Using CycleGANs to Generate Realistic STEM Images for Machine Learning., , , and . CoRR, (2023)