Author of the publication

A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol.

, , , and . IEEE Open J. Comput. Soc., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems., , , and . IEEE Trans. Inf. Forensics Secur., (2020)Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey., , , , and . ACM Comput. Surv., 55 (9): 191:1-191:43 (2023)An explainable deep learning-enabled intrusion detection framework in IoT networks., , , , , and . Inf. Sci., (August 2023)Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media., , and . TrustCom, page 856-863. IEEE, (2020)Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains., and . SP (Workshops), page 128-135. IEEE, (2020)Googling Forensics., , and . Australian Computer, Network & Information Forensics Conference, page 62-67. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis., , and . ARES, page 1361-1368. IEEE Computer Society, (2008)Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation., and . ARES, page 1012-1017. IEEE Computer Society, (2009)Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics., and . ARES, page 1355-1360. IEEE Computer Society, (2008)A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC., , and . e-Forensics, volume 8 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 116-121. Springer, (2009)