Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A type I hybrid ARQ system with adaptive code rates., and . IEEE Trans. Commun., 43 (2/3/4): 733-737 (1995)A Practical Password-Based Two-Server Authentication and Key Exchange System., , and . IEEE Trans. Dependable Secur. Comput., 3 (2): 105-114 (2006)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , and . ACM Conference on Computer and Communications Security, page 54-65. ACM, (2009)Secure access to outsourced data.. SCC@ASIACCS, page 1-2. ACM, (2013)Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management., , and . Int. J. Inf. Sec., 17 (3): 347-363 (2018)Multiuser private queries over encrypted databases., , , and . Int. J. Appl. Cryptogr., 1 (4): 309-319 (2009)CrowdFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning., , , and . IEEE Trans. Mob. Comput., 22 (8): 4607-4619 (August 2023)Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data., , , , , , and . IEEE Internet Things J., 6 (6): 9841-9852 (2019)PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability., , , , , , , and . J. Parallel Distributed Comput., (2023)Zero-error watermarking on jpeg images by shuffling huffman tree nodes., and . VCIP, page 1-4. IEEE, (2011)