Author of the publication

An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.

, , , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient greedy task scheduling algorithm for heterogeneous inter-dependent tasks on computational grids., , , and . Int. J. Grid Util. Comput., 11 (5): 587-601 (2020)Towards a LightWeight Internet of Things Platform Architecture., , and . J. ICT Stand., 1 (2): 241-252 (2013)EdgeNet for efficient scene graph classification., , , , and . IJCNN, page 1-8. IEEE, (2022)An Efficient Two-Party ECDSA Scheme for Cryptocurrencies., , , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)Monotonic Signed Graph approach for cross-layer congestion control in wireless ad-hoc networks., , and . GLOBECOM Workshops, page 309-314. IEEE, (2011)Resilience to Denial-of-Service and Integrity Attacks: A Structured Systems Approach., , , , and . CoRR, (2021)Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture., , , , , , and . AINA Workshops, page 373-380. IEEE Computer Society, (2016)Structural resilience of cyberphysical systems under attack., , and . ACC, page 283-289. IEEE, (2016)Resilience to denial-of-service and integrity attacks: A structured systems approach., , , , and . Eur. J. Control, (2022)PrivFlow: Secure and Privacy Preserving Serverless Workflows on Cloud., , , , and . CCGrid, page 447-458. IEEE, (2023)