Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Deep Learning Model-Specific Explanations at the End User's Side., , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 30 (Supplement-2): 255-278 (December 2022)Efficient privacy-preserving implicit authentication., and . Comput. Commun., (2018)Practical secure and privacy-preserving scheme for value-added applications in VANETs., , , , and . Comput. Commun., (2015)Discrimination- and privacy-aware patterns., , , , and . Data Min. Knowl. Discov., 29 (6): 1733-1782 (2015)Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security., , , , and . Inf. Sci., (2014)Optimal data-independent noise for differential privacy., and . Inf. Sci., (2013)Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response., , , , and . IEEE Trans. Computers, 65 (8): 2562-2574 (2016)Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts., , , , , and . IEEE Trans. Computers, 65 (2): 466-479 (2016)A polynomial-time approximation to optimal multivariate microaggregation., , and . Comput. Math. Appl., 55 (4): 714-732 (2008)Full Secure Key Exchange and Authentication with no Previously Shared Secrets., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 665-669. Springer, (1989)