Author of the publication

3-Party Adversarial Cryptography.

, , and . EIDWT, volume 47 of Lecture Notes on Data Engineering and Communications Technologies, page 247-258. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)On zero-knowledge proofs (extended abstract): "from membership to decision"., , and . STOC, page 255-264. ACM, (2000)A proposal for the privacy leakage verification tool for Android application developers., and . ICUIMC, page 54. ACM, (2013)An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme., , and . WWW (Posters), (2003)A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository., and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 155-168. IOS Press, (2005)Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 257-262. IEEE, (2018)Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network., , , and . J. Networks, 7 (1): 88-100 (2012)Evaluation of a Zero-Watermarking-Type Steganography., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 613-624. Springer, (2014)A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks., , , , and . Comput. Commun., 35 (17): 2125-2137 (2012)Handling class Imbalance problem in Intrusion Detection System based on deep learning., , and . Int. J. Netw. Comput., 12 (2): 467-492 (2022)