Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Homomorphic encryption based cancelable biometrics secure against replay and its related attack., , , , and . ISITA, page 421-425. IEEE, (2012)Efficient construction of secure hyperelliptic discrete logarithm problems., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 292-301. Springer, (1997)Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 214-234. Springer, (2017)A key pre-distribution scheme for secure sensor networks using probability density function of node deployment., , , and . SASN, page 69-75. ACM, (2005)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)Your Health Is Leaked: PPG Waveform Reconstruction Using Stealthily Recorded Physiological Signals., , , , and . EMBC, page 1-4. IEEE, (2023)A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols., , , , , and . ISITA, page 315-319. IEEE, (2016)Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes., , , , , , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 91-110. Springer, (2016)Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption., , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 183-200. Springer, (2013)Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential., , , , , , , , and . NBiS, volume 526 of Lecture Notes in Networks and Systems, page 201-211. Springer, (2022)