Author of the publication

International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).

, , , , , and . CIKM, page 4886-4887. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical vulnerability analysis of automated smart contracts security testing on blockchains., , , and . CASCON, page 103-113. ACM, (2018)Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things., , , , , and . CoRR, (2019)An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations., , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 488-506. Springer, (2018)Heterogeneous investment in spatial public goods game with mixed strategy., , , , and . Soft Comput., 22 (4): 1287-1294 (2018)Errors in Computational Complexity Proofs for Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 624-643. Springer, (2005)Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 585-604. Springer, (2005)Secret Signatures: How to Achieve Business Privacy Efficiently?, , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 30-47. Springer, (2007)On Lightweight Security Enforcement in Cyber-Physical Systems., , , and . LightSec, volume 9542 of Lecture Notes in Computer Science, page 97-112. Springer, (2015)Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis., , , and . AISC, volume 161 of CRPIT, page 53-56. Australian Computer Society, (2015)A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks., , and . RFIDSec, volume 10155 of Lecture Notes in Computer Science, page 30-44. Springer, (2016)