Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing., , , , , , and . IEEE Trans. Cloud Comput., 11 (1): 564-578 (January 2023)Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol., , , , , and . IEEE Access, (2019)Some Practical Properties of AP14., , , and . INCoS, page 527-531. IEEE, (2016)Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme., , , , and . IEEE Access, (2024)Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing., , , , and . J. King Saud Univ. Comput. Inf. Sci., 36 (6): 102114 (2024)Digital Cardan Grille: A Modern Approach for Information Hiding., , , , , and . CSAI/ICIMT, page 441-446. ACM, (2018)Construction of a Fully Homomorphic Encryption Scheme with Shorter Ciphertext and Its Implementation on the CUDA Platform., , , , , and . EIDWT, volume 161 of Lecture Notes on Data Engineering and Communications Technologies, page 141-151. Springer, (2023)Attacks and Improvement of Unlinkability of Biometric Template Protection Scheme Based on Bloom Filters., , , and . IEEE Trans. Cloud Comput., 11 (3): 3251-3261 (July 2023)A structure-preserving linearly homomorphic signature scheme with designated combiner., , , , and . PeerJ Comput. Sci., (2024)