Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compressed video watermarking technique., , , , , , and . I2MTC, page 1790-1794. IEEE, (2013)Towards Convergence of Blockchain and Self-sovereign Identity for Privacy-Preserving Secure Federated Learning., , , , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 243-255. Springer, (2021)Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction., , , , , and . Symmetry, 14 (1): 64 (2022)Towards a Privacy-Preserving Voting System Through Blockchain Technologies., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 602-608. IEEE, (2019)An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing., , and . Future Internet, 9 (4): 65 (2017)An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications., , , , and . ISPRS Int. J. Geo Inf., 7 (2): 53 (2018)A novel secure and distributed architecture for privacy-preserving healthcare system., , , , , , and . J. Netw. Comput. Appl., (2023)An Effective Model for Anonymizing Personal Location Trajectory., , , and . ICCNS, page 35-39. ACM, (2016)An effective value swapping method for privacy preserving data publishing., , , , and . Secur. Commun. Networks, 9 (16): 3219-3228 (2016)A General Framework for Privacy Preserving Sequential Data Publishing., and . AINA Workshops, page 519-524. IEEE Computer Society, (2017)