Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures., and . Security and Management, page 314-317. CSREA Press, (2009)Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark., and . CoRR, (2017)Higher Order Side-Channel Attacks Resilient S-boxes., , , and . IACR Cryptology ePrint Archive, (2018)Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics., and . ICDIS, page 43-48. IEEE, (2018)A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme., , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 282-288. Springer, (2013)A note on "new quantum key agreement protocols based on Bell states"., and . Quantum Inf. Process., 20 (2): 74 (2021)Anonymous Fair Auction on Blockchain., , , , and . NTMS, page 1-5. IEEE, (2021)Automating Feature Extraction and Feature Selection in Big Data Security Analytics., and . ICAISC (2), volume 10842 of Lecture Notes in Computer Science, page 423-432. Springer, (2018)MicroLET: A New SDNoC-Based Communication Protocol for ChipLET-Based Systems., , , , , and . DSD, page 61-68. IEEE, (2019)Power analysis attack: an approach based on machine learning., , and . Int. J. Appl. Cryptogr., 3 (2): 97-115 (2014)