Author of the publication

Transmission Power Controlled Localization with Topology Building for NLOS Environments.

, , , and . IJDSN, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017., , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 780-786. Springer, (2018)Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem., , , and . Theor. Comput. Sci., (2019)Efficient public key encryption with equality test in the standard model., , , , and . Theor. Comput. Sci., (2019)On the Efficiency of FHE-Based Private Queries., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 357-363 (2018)Experimenting With Non-Interactive Range Proofs Based on the Strong RSA Assumption., and . IEEE Access, (2019)Search Condition-Hiding Query Evaluation on Encrypted Databases., , , , , and . IEEE Access, (2019)A Review on AI-Enabled Congestion Control Schemes for Content Centric Networks., , , , , , and . ICTC, page 659-662. IEEE, (2023)CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test., , , and . Comput. J., 59 (11): 1689-1694 (2016)Invertible Polynomial Representation for Private Set Operations., , and . ICISC, volume 8565 of Lecture Notes in Computer Science, page 277-292. Springer, (2013)Public key encryption with equality test in the standard model., , , , and . Inf. Sci., (2020)