Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment., , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 1-14. (2016)Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply., , , and . Wireless Networks, 15 (1): 39-51 (2009)Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data., , , , and . IEEE Trans. Image Processing, 25 (7): 3411-3425 (2016)Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster., , , and . MobiCom, page 473-474. ACM, (2016)zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge., , , and . Blockchain, page 83-90. IEEE, (2019)Fast and scalable secret key generation exploiting channel phase randomness in wireless networks., , , and . INFOCOM, page 1422-1430. IEEE, (2011)A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks., , and . WISEC, page 62-67. ACM, (2008)Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance., , , , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 480-496. Springer, (2019)Persistent Fault Attack in Practice., , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (2): 172-195 (2020)Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation., , , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (4): 745-759 (2020)