Author of the publication

A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities.

, , and . SERE (Companion), page 119-126. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities., , and . SERE (Companion), page 119-126. IEEE, (2012)Delegated integrity check for hierarchical cloud data., and . J. Comput. Secur., 23 (4): 471-508 (2015)Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤp., , and . J. Inf. Sci. Eng., 33 (1): 233-250 (2017)An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems., , and . IEEE Trans. Reliability, 64 (3): 840-851 (2015)Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp., , and . IACR Cryptology ePrint Archive, (2015)A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring., , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 544-560. Springer, (2012)Delegable Provable Data Possession for Remote Data in the Clouds., and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 93-111. Springer, (2011)Unique Signature with Short Output from CDH Assumption., , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 475-488. Springer, (2015)Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System., , , and . AINA, page 740-747. IEEE Computer Society, (2012)