Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving recommendation system based on user classification., , , and . J. Inf. Secur. Appl., (December 2023)A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption., , , , and . IEEE Access, (2018)Protecting Private Information for Two Classes of Aggregated Database Queries., , , , , and . Informatics, 9 (3): 66 (2022)Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities., , , , and . Future Gener. Comput. Syst., (2020)Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation., , , , and . Future Gener. Comput. Syst., (2017)A new privacy-preserving authentication protocol for anonymous web browsing., , , , , , , and . Concurr. Comput. Pract. Exp., (2019)Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System., , , , , , , and . IEEE Trans. Sustain. Comput., 9 (1): 88-99 (January 2024)Securing Body Sensor Network with ECG., , , , and . MoMM, page 298-306. ACM, (2016)Mobile Fingerprint for Identity Authentication in Mobile Commerce Applications., and . MoMM, page 157-160. ACM, (2014)Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain., , , and . WISE (1), volume 11233 of Lecture Notes in Computer Science, page 18-35. Springer, (2018)