Author of the publication

A Framework for the User-Oriented Personal Information Protection.

, and . Security and Management, page 12-19. CSREA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 257-262. IEEE, (2018)Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack., and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 178-190. Springer, (2000)A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem., and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 296-308. Springer, (1998)A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm., and . PQCrypto, volume 7071 of Lecture Notes in Computer Science, page 275-294. Springer, (2011)A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 433-442. Springer, (2005)Application and Evaluation of Bayesian Filter for Chinese Spam., , and . Inscrypt, volume 4318 of Lecture Notes in Computer Science, page 253-263. Springer, (2006)Formal Verification for Access Control in Web Information Sharing System., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 80-89. Springer, (2009)Differential Fault Analysis of Full LBlock., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 135-150. Springer, (2012)Application of NTRU Using Group Rings to Partial Decryption Technique., , and . INTRUST, volume 9565 of Lecture Notes in Computer Science, page 203-213. Springer, (2015)