Author of the publication

Cryptographic collusion-resistant protocols for secure sum.

, and . Int. J. Electron. Secur. Digit. Forensics, 9 (1): 19-34 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy, reputation, and incentive provision for vehicular social networks., , and . J. Reliab. Intell. Environ., 9 (4): 447-461 (December 2023)Anonymous decentralized attribute-based access control for cloud-assisted IoT., and . Future Gener. Comput. Syst., (2020)ADAM-DPGAN: a differential private mechanism for generative adversarial network., , and . Appl. Intell., 53 (9): 11142-11161 (May 2023)Toward signature extraction of Metasploit encoding algorithms using static analysis., and . Int. J. Secur. Networks, 13 (2): 71-83 (2018)Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems., , and . ISC Int. J. Inf. Secur., 12 (2): 129-140 (2020)An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks., , and . ISeCure, 10 (1): 15-27 (2018)GLP: A cryptographic approach for group location privacy., , and . Comput. Commun., 35 (12): 1527-1533 (2012)The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services., , and . Knowl. Inf. Syst., 45 (3): 589-615 (2015)Privacy-Preserving Distributed Data Access Control for CloudIoT., and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2476-2487 (2022)A White-Box Generator Membership Inference Attack Against Generative Models., , and . ISCISC, page 13-17. IEEE, (2021)