Author of the publication

Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks.

, , , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 506-518. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials., , , and . Symmetry, 11 (1): 88 (2019)Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications., , , and . Secur. Commun. Networks, (2020)Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry., , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 73-86. Springer, (2016)Detection and classification of malicious patterns in network traffic using Benford's law., , , , , and . APSIPA, page 864-872. IEEE, (2017)A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks., , , and . CSS, volume 13172 of Lecture Notes in Computer Science, page 16-35. Springer, (2021)Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features., , , and . ICMLT, page 79-85. ACM, (2020)Provably Secure Proactive Secret Sharing Without the Adjacent Assumption., , , , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 247-264. Springer, (2019)An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET., , , , , , and . IEEE Internet Things J., 11 (7): 11232-11245 (April 2024)Threat Analysis of a Practical Voting Scheme with Receipts., , , and . VOTE-ID, volume 4896 of Lecture Notes in Computer Science, page 156-165. Springer, (2007)PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations., , , , and . IEEE Syst. J., 15 (1): 759-770 (2021)