Author of the publication

PPD-DL: Privacy-Preserving Decentralized Deep Learning.

, , , and . ICAIS (1), volume 11632 of Lecture Notes in Computer Science, page 273-282. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program., , and . IEEE Access, (2017)Energy Flow Domain Reverse-Time Migration for Borehole Radar., , , , , , and . IEEE Trans. Geosci. Remote. Sens., 57 (9): 7221-7231 (2019)Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection., , , and . Mob. Inf. Syst., (2020)Breaking a Robust Remote User Authentication Scheme Using Smart Cards., , , and . NPC, volume 7513 of Lecture Notes in Computer Science, page 110-118. Springer, (2012)A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS., , and . IJDSN, (2015)Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing., , , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 246-253. Springer, (2012)Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme., , and . ICDCIT, volume 7154 of Lecture Notes in Computer Science, page 141-152. Springer, (2012)A Homomorphic Proxy Re-encryption from Lattices., , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 353-372. (2016)Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme., , , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 256-267. Springer, (2017)A Users Collaborative Scheme for Location and Query Privacy., , , and . ICPADS, page 383-390. IEEE Computer Society, (2016)