Author of the publication

Cryptographic collusion-resistant protocols for secure sum.

, and . Int. J. Electron. Secur. Digit. Forensics, 9 (1): 19-34 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward signature extraction of Metasploit encoding algorithms using static analysis., and . Int. J. Secur. Networks, 13 (2): 71-83 (2018)A White-Box Generator Membership Inference Attack Against Generative Models., , and . ISCISC, page 13-17. IEEE, (2021)Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems., , and . ISCISC, page 1-7. IEEE, (2017)Blockchain for steganography: advantages, new algorithms and open challenges., , and . ISCISC, page 1-5. IEEE, (2021)An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network., , and . ISC Int. J. Inf. Secur., (July 2023)A Lightweight and Secure Data Sharing Protocol for D2D Communications., , and . ISCISC, page 42-47. IEEE, (2017)Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks., , and . ISC Int. J. Inf. Secur., 14 (3): 101-112 (2022)Cryptographic collusion-resistant protocols for secure sum., and . Int. J. Electron. Secur. Digit. Forensics, 9 (1): 19-34 (2017)Efficient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries., , and . Wirel. Networks, 25 (8): 4799-4814 (2019)