Author of the publication

Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?

, , , , , , , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment., , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 233-240. Springer, (2012)Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User., , , and . Secur. Commun. Networks, (2017)Security Enhancement of a Remote User Authentication Scheme Using Smart Cards., , and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 508-516. Springer, (2006)Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks., , , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 535-540. Springer, (2013)Two Efficient and Secure Authentication Schemes Using Smart Cards., , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 858-866. Springer, (2006)An Inter-domain Key Agreement Protocol Using Weak Passwords., , and . ICCSA (3), volume 3982 of Lecture Notes in Computer Science, page 517-526. Springer, (2006)Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme., , , and . IACR Cryptology ePrint Archive, (2011)Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks., , , , and . Sensors, 14 (4): 6443-6462 (2014)A Study on Security Risk Modeling over Information and Communication Infrastructure., , , and . Security and Management, page 249-253. CSREA Press, (2004)One-time self-certified public keys, revisited., , and . ICISC, page 59-69. Korea Institute of Information Security and Cryptology (KIISC), (1998)