Author of the publication

Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.

, , , , and . AsiaCCS, page 501-515. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Speed High-Security Public Key Encryption with Keyword Search., , and . DBSec, volume 10359 of Lecture Notes in Computer Science, page 365-385. Springer, (2017)The insecurity of a certificateless undeniable signature scheme., and . IWCMC, page 582-587. IEEE, (2016)Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme., , and . Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 474-477. Springer, (2016)MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves., , , and . CODASPY, page 17-28. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Differentially Private Stochastic Gradient Descent with Fixed-Size Minibatches: Tighter RDP Guarantees with or without Replacement., , , and . NeurIPS, (2024)EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy., , , and . ICDM (Workshops), page 560-566. IEEE, (2022)Compact Energy and Delay-Aware Authentication., , and . CNS, page 1-9. IEEE, (2018)IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones., , and . CoRR, (2019)Lattice-Based Public Key Encryption with Keyword Search., , and . IACR Cryptology ePrint Archive, (2017)Unsupervised Threat Hunting using Continuous Bag of Terms and Time (CBoTT)., , , , and . ICIS, Association for Information Systems, (2023)