Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing network lifetime in wireless sensor networks with regular topologies., , and . J. Supercomput., 69 (2): 512-527 (2014)Incorporating Manifold Ranking with Active Learning in Relevance Feedback for Image Retrieval., , , and . PDCAT, page 739-744. IEEE, (2012)On Robust Multicast in Multi-channel Multi-radio Wireless Mesh Networks., , , , , and . PDCAT, page 117-121. IEEE, (2012)Privacy preserving set intersection based on bilinear groups., and . ACSC, volume 74 of CRPIT, page 47-54. Australian Computer Society, (2008)Guest editorial: Parallel computing and applications., , and . Comput. Sci. Inf. Syst., (2020)Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption., , , and . Secur. Commun. Networks, (2021)A Privacy-Preserving Data Publishing Method for Multiple Numerical Sensitive Attributes via Clustering and Multi-sensitive Bucketization., , and . PAAP, page 220-223. IEEE Computer Society, (2014)Secure Data Aggregation in Wireless Sensor Networks: A Survey., , , , and . PDCAT, page 315-320. IEEE Computer Society, (2006)An Improved Chord Based on Counting Bloom Filter and Topology-Aware Lookup., , , , and . PDCAT, page 703-706. IEEE, (2012)Efficient and secure protocols for privacy-preserving set operations., and . ACM Trans. Inf. Syst. Secur., 13 (1): 9:1-9:35 (2009)