Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds., , and . Inf. Sci., (2018)Connecting Randomized Response, Post-Randomization, Differential Privacy and t-Closeness via Deniability and Permutation., and . CoRR, (2018)Co-Utility: Self-Enforcing Protocols without Coordination Mechanisms., , and . CoRR, (2015)Full Secure Key Exchange and Authentication with no Previously Shared Secrets., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 665-669. Springer, (1989)Big Data Privacy: Challenges to Privacy Principles and Models., and . Data Sci. Eng., 1 (1): 21-28 (2016)A distributed architecture for scalable private RFID tag identification., , , and . Comput. Networks, 51 (9): 2268-2279 (2007)Differentially private data publishing via optimal univariate microaggregation and record perturbation., and . Knowl. Based Syst., (2018)Anonymous and secure aggregation scheme in fog-based public cloud computing., , and . Future Gener. Comput. Syst., (2018)Multi-application smart cards and encrypted data, processing.. Future Gener. Comput. Syst., 13 (1): 65-74 (1997)Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response., , , , and . IEEE Trans. Computers, 65 (8): 2562-2574 (2016)