Author of the publication

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.

, , , , , , , and . Cryptogr., 8 (1): 5 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE)., and . Cryptographic Algorithms and their Uses, page 1-13. Queensland University of Technology, (2004)CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique., , and . Cryptographic Algorithms and their Uses, page 28-39. Queensland University of Technology, (2004)Cryptanalysis of the LAKE Hash Family., , , , , , , , and . FSE, volume 5665 of Lecture Notes in Computer Science, page 156-179. Springer, (2009)On secure outsourcing of cryptographic computations to cloud., , and . SCC@ASIACCS, page 63-68. ACM, (2014)Linear Cryptanalysis of Round Reduced SIMON., , , , and . IACR Cryptology ePrint Archive, (2013)Improved Linear Cryptanalysis of Round Reduced SIMON., , , , , and . IACR Cryptology ePrint Archive, (2014)An Update on the Analysis and Design of NMAC and HMAC Functions., , and . Int. J. Netw. Secur., 7 (1): 49-60 (2008)The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 2368-2381 (February 2023)Vulnerability Database as a Service for IoT., , , and . ATIS, volume 1338 of Communications in Computer and Information Science, page 95-107. Springer, (2020)Blockchain for IoT security and privacy: The case study of a smart home., , , and . PerCom Workshops, page 618-623. IEEE, (2017)