Author of the publication

On the Leakage Resilient Cryptography in Game-Theoretic Settings.

, , and . Trustcom/BigDataSE/ISPA, page 1984-1989. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure., and . SECRYPT, page 84-93. SciTePress, (2012)Efficient and Low-Cost RFID Authentication Schemes, , and . CoRR, (2012)KIMAP: Key-Insulated Mutual Authentication Protocol for RFID, and . CoRR, (2012)Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems., , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 1009-1018 (2021)Efficient and Low-Cost RFID Authentication Schemes., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (3): 4-25 (2011)Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities., , , , , , and . TrustCom, page 1291-1296. IEEE, (2020)CRAB: Blockchain Based Criminal Record Management System., , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 294-303. Springer, (2018)On the Leakage Resilient Cryptography in Game-Theoretic Settings., , and . Trustcom/BigDataSE/ISPA, page 1984-1989. IEEE, (2016)Privacy-Preserving Data Mining: A Game-Theoretic Approach., and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 186-200. Springer, (2011)Dynamic attribute-based signcryption without random oracles., , and . Int. J. Appl. Cryptogr., 2 (3): 199-211 (2012)