Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-Based Public Key Encryption with Keyword Search., , and . IACR Cryptology ePrint Archive, (2017)IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones., , and . CoRR, (2019)A Multi-server ORAM Framework with Constant Client Bandwidth Blowup., , and . ACM Trans. Priv. Secur., 23 (1): 1:1-1:35 (2020)Scalable and Lightweight Post-Quantum Authentication for Internet of Things., , and . CoRR, (2023)Trace-Σ: a privacy-preserving contact tracing app., , , , , , , and . IACR Cryptol. ePrint Arch., (2020)Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations., , , , and . AsiaCCS, page 501-515. ACM, (2021)Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures., , , and . TPS-ISA, page 267-276. IEEE, (2023)Efficient Dynamic Proof of Retrievability for Cold Storage., , , , and . NDSS, The Internet Society, (2023)Practical Cryptographic Forensic Tools for Lightweight Internet of Things and Cold Storage Systems., and . IoTDI, page 340-353. ACM, (2023)Compact Energy and Delay-Aware Authentication., , and . CNS, page 1-9. IEEE, (2018)