Author of the publication

SAKE: scalable authenticated key exchange for mobile e-health networks.

, , , , , and . Secur. Commun. Networks, 9 (15): 2754-2765 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory., , , , , , and . CoRR, (2023)Optimal Private Set Union from Multi-Query Reverse Private Membership Test., , , , and . IACR Cryptol. ePrint Arch., (2022)Linear Private Set Union from Multi-Query Reverse Private Membership Test., , , , and . USENIX Security Symposium, page 337-354. USENIX Association, (2023)An Improved Semantic Link Based Cyber Community Discovery Model on Social Network., , , and . KSEM (3), volume 13370 of Lecture Notes in Computer Science, page 329-338. Springer, (2022)Hierarchical Identity-Based Broadcast Encryption., , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 242-257. Springer, (2014)Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation., , , , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 699-720. Springer, (2021)Efficient Private Multiset ID Protocols., , , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 351-369. Springer, (2023)Intertwining Order Preserving Encryption and Differential Privacy., , , , and . CoRR, (2020)A fault localization approach based on multi-system PCA and dynamic SDG: Application in train lifting equipment., , , , and . Robotics Comput. Integr. Manuf., (June 2024)Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption., , , , and . Int. J. Inf. Sec., 15 (1): 35-50 (2016)