Author of the publication

Group Signature with Signer-Controlled Opening Capability: Separate Token Generator.

, and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 883-887. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualizing Privacy Risks of Mobile Applications through a Privacy Meter., , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 548-558. Springer, (2015)Low-power shared memory architecture power mode for mobile system-on-chip., , , , and . IEICE Electron. Express, (2014)Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks., , , and . AsiaCCS, page 313-326. ACM, (2017)A Design of Demand Response Energy Optimization System for Micro Grid., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 511-516. Springer, (2018)Designing 3D Propeller by Applying Bird's Wing and Making a Test Product., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 811-817. Springer, (2018)A Study on the LMS Platform Performance and Performance Improvement of K-MOOCs Platform from Learner's Perspective., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 781-786. Springer, (2018)Limiting Data Exposure in Monitoring Multi-domain Policy Conformance., , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 65-82. Springer, (2013)Assessing software integrity of virtual appliances through software whitelists., , , , , , and . NDSS, The Internet Society, (2013)On Smartphone Users' Difficulty with Understanding Implicit Authentication., , , and . CHI, page 690:1-690:14. ACM, (2021)SysPal: System-Guided Pattern Locks for Android., , , , , and . IEEE Symposium on Security and Privacy, page 338-356. IEEE Computer Society, (2017)