Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism., , , , , , and . CoRR, (2022)Bit Flipping Key Encapsulation for the Post-Quantum Era., , , and . IEEE Access, (2023)SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Towards quantum-secure software defined networks., , , , and . IET Quantum Commun., 5 (1): 66-71 (March 2024)PASPORT: A Secure and Private Location Proof Generation and Verification Framework., , , , and . IEEE Trans. Comput. Soc. Syst., 7 (2): 293-307 (2020)Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 288-300 (2023)Bushfire Risk Detection Using Internet of Things: An Application Scenario., , , , and . IEEE Internet Things J., 9 (7): 5266-5274 (2022)Blockchain for secure location verification., , , , and . J. Parallel Distributed Comput., (2020)Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Personalized Privacy Protection in Big Data, , , and . Springer, (2021)