Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments., , , , , , , and . ARES, page 145:1-145:11. ACM, (2024)Location Privacy Protection in Social Networks. University of Technology Sydney, Australia, (2020)HSDC-Net: Secure Anonymous Messaging in Online Social Networks., , , and . TrustCom/BigDataSE, page 350-357. IEEE, (2019)Improving Data Utility Through Game Theory in Personalized Differential Privacy., , , , , and . J. Comput. Sci. Technol., 34 (2): 272-286 (2019)Towards Spoofing Resistant Next Generation IoT Networks., , , and . IEEE Trans. Inf. Forensics Secur., (2022)SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems., , , and . APKC@AsiaCCS, page 2-9. ACM, (2023)Distance-based location privacy protection in social networks., , , , and . ITNAC, page 1-6. IEEE Computer Society, (2017)Bushfire Risk Detection Using Internet of Things: An Application Scenario., , , , and . IEEE Internet Things J., 9 (7): 5266-5274 (2022)Blockchain for secure location verification., , , , and . J. Parallel Distributed Comput., (2020)