Author of the publication

A two-party privacy preserving set intersection protocol against malicious users in cloud computing.

, , , and . Comput. Stand. Interfaces, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Anonymous Registration Scheme for Mobile IPv4., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 758-766. Springer, (2006)Efficient ID-based registration protocol featured with user anonymity in mobile IP networks., , , , , , and . IEEE Trans. Wirel. Commun., 9 (2): 594-604 (2010)Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (12): 3833-3836 (2008)A Multi-Swarm PSO Approach to Large-Scale Task Scheduling in a Sustainable Supply Chain Datacenter., , , , , , and . IEEE Trans. Green Commun. Netw., 7 (4): 1667-1677 (December 2023)A Unified Model for Tracking and Image-Video Detection Has More Power., , , , , , , , and . CoRR, (2022)Object-Centric Unsupervised Image Captioning., , , , and . CoRR, (2021)Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing., , and . Secur. Commun. Networks, (2020)An Improved Cross-Validated Adversarial Validation Method., , , , , and . KSEM (1), volume 14117 of Lecture Notes in Computer Science, page 343-353. Springer, (2023)Object-Centric Unsupervised Image Captioning., , , , and . ECCV (36), volume 13696 of Lecture Notes in Computer Science, page 219-235. Springer, (2022)We Need to Talk About Reproducibility in NLP Model Comparison., , , , , and . EMNLP, page 9424-9434. Association for Computational Linguistics, (2023)