Author of the publication

Secure Multi-Party Computation on Blockchain: An Overview.

, , , and . PAAP, volume 1163 of Communications in Computer and Information Science, page 452-460. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption., , , and . Secur. Commun. Networks, (2021)Maximizing network lifetime in wireless sensor networks with regular topologies., , and . J. Supercomput., 69 (2): 512-527 (2014)Privacy preserving set intersection based on bilinear groups., and . ACSC, volume 74 of CRPIT, page 47-54. Australian Computer Society, (2008)Incorporating Manifold Ranking with Active Learning in Relevance Feedback for Image Retrieval., , , and . PDCAT, page 739-744. IEEE, (2012)On Robust Multicast in Multi-channel Multi-radio Wireless Mesh Networks., , , , , and . PDCAT, page 117-121. IEEE, (2012)Guest editorial: Parallel computing and applications., , and . Comput. Sci. Inf. Syst., (2020)A Privacy-Preserving Data Publishing Method for Multiple Numerical Sensitive Attributes via Clustering and Multi-sensitive Bucketization., , and . PAAP, page 220-223. IEEE Computer Society, (2014)Secure Data Aggregation in Wireless Sensor Networks: A Survey., , , , and . PDCAT, page 315-320. IEEE Computer Society, (2006)Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud., and . Sensors, 21 (20): 6821 (2021)LHKV: A Key-Value Data Collection Mechanism Under Local Differential Privacy., , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 228-242. Springer, (2023)