Author of the publication

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.

, , , , and . MobiQuitous (Adjunct Proceedings), page 88-93. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015., and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 901-913. Springer, (2017)Electronic Auctions with Private Bids., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks., , , , and . DSC, page 1-8. IEEE, (2018)Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks., , , , and . Int. J. Inf. Sec., 19 (3): 245-255 (2020)Privacy-Preserving Decision Tree Learning with Boolean Target Class., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (11): 2291-2300 (2015)Multiparty Computation from El Gamal/Paillier Conversion., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 137-146 (2009)Identification of incompletely specified multiple-valued Kleenean functions., , , and . IEEE Trans. Syst. Man Cybern. Part A, 28 (5): 637-647 (1998)Proposal of anonymization dictionary using disclosed statements by business operators., , , , , , and . Internet Things, (2022)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). Proc. Priv. Enhancing Technol., 2023 (1): 225-243 (January 2023)Attacker models with a variety of background knowledge to de-identified data., , and . J. Ambient Intell. Humaniz. Comput., 14 (11): 15037-15047 (2023)