Author of the publication

At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid.

, , , and . IWCMC, page 1067-1072. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach., and . ISA, volume 76 of Communications in Computer and Information Science, page 116-127. Springer, (2010)Application Program Interface as Back-Up Data Source for SCADA Systems., and . ISA, volume 200 of Communications in Computer and Information Science, page 219-226. Springer, (2011)Biometric Authentication Using Infrared Imaging of Hand Vein Patterns., , , , , and . ISA, volume 76 of Communications in Computer and Information Science, page 108-115. Springer, (2010)Identification of Plant Using Leaf Image Analysis., , , and . FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 291-303. Springer, (2010)A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC., , , and . SNPD, page 170-176. ACIS, (2003)Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management., , , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 360-369. Springer, (2009)Virtual learning communities: unsolved troubles., , and . Multimedia Tools Appl., 74 (19): 8505-8519 (2015)A Model of Hierarchically Consistent Control of Nonlinear Dynamical Systems., and . FGIT-CA/CES3, volume 256 of Communications in Computer and Information Science, page 58-64. Springer, (2011)Test Case Minimization and Prioritization Using CMIMX Technique., , , , and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 25-33. Springer, (2009)A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system., , , and . CommNet, page 1-10. IEEE, (2018)