Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures., and . Security and Management, page 314-317. CSREA Press, (2009)Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics., and . ICDIS, page 43-48. IEEE, (2018)A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme., , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 282-288. Springer, (2013)Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark., and . CoRR, (2017)Higher Order Side-Channel Attacks Resilient S-boxes., , , and . IACR Cryptology ePrint Archive, (2018)A note on "new quantum key agreement protocols based on Bell states"., and . Quantum Inf. Process., 20 (2): 74 (2021)MicroLET: A New SDNoC-Based Communication Protocol for ChipLET-Based Systems., , , , , and . DSD, page 61-68. IEEE, (2019)Automating Feature Extraction and Feature Selection in Big Data Security Analytics., and . ICAISC (2), volume 10842 of Lecture Notes in Computer Science, page 423-432. Springer, (2018)Anonymous Fair Auction on Blockchain., , , , and . NTMS, page 1-5. IEEE, (2021)Secure Communication on NoC Based MPSoC., , , , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 417-428. Springer, (2018)