Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach., , , and . IEEE Trans. Engineering Management, 67 (4): 1244-1255 (2020)Formal verification and complexity analysis of confidentiality aware textual clinical documents framework., , , , , and . Int. J. Intell. Syst., 37 (12): 10380-10399 (December 2022)(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility., , , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)Using CycleGANs to Generate Realistic STEM Images for Machine Learning., , , and . CoRR, (2023)Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions., , , and . Comput. Networks, (2019)Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data., , , , , and . ACM Trans. Internet Techn., 22 (2): 42:1-42:21 (2022)Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud., , , , , , , , and . Int. J. Distributed Sens. Networks, (2019)Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs., , and . SSCI, page 1-7. IEEE, (2021)Secure Logging as a Service Using Reversible Watermarking., , , , and . FNC/MobiSPC, volume 110 of Procedia Computer Science, page 336-343. Elsevier, (2017)Data trustworthiness in IoT., , , , , and . ICOIN, page 414-419. IEEE, (2018)