Author of the publication

pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT.

, , and . Trans. Data Priv., 9 (2): 101-130 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inside Attack Filtering for Robust Sensor Localization., and . AsiaCCS, page 931-936. ACM, (2016)Specification of Calendars and Time Series for Temporal Databases., , and . ER, volume 1157 of Lecture Notes in Computer Science, page 341-356. Springer, (1996)pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT., , and . Trans. Data Priv., 9 (2): 101-130 (2016)GPU-based parallel genetic approach to large-scale travelling salesman problem., , , and . J. Supercomput., 72 (11): 4399-4414 (2016)Partial Materialization for Data Integration in SQL-on-Hadoop Engines., , , , and . ICITCS, page 1-2. IEEE Computer Society, (2016)CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks., , and . ICDCS Workshops, page 7-12. IEEE Computer Society, (2017)FarmBeats: An IoT Platform for Data-Driven Agriculture., , , , , , , , and . NSDI, page 515-529. USENIX Association, (2017)A Secure Communication Protocol for Drones and Smart Objects., , and . AsiaCCS, page 249-260. ACM, (2015)Modelling Chlorophyll-a Concentration using Deep Neural Networks considering Extreme Data Imbalance and Skewness., , , and . ICACT, page 631-634. IEEE, (2019)Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks., and . NSS, volume 9408 of Lecture Notes in Computer Science, page 18-31. Springer, (2015)