Author of the publication

Personalized Privacy-Preserving Data Aggregation for Histogram Estimation.

, , , , , and . GLOBECOM, page 1-6. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking A Proxy Signature Scheme From Lattices., and . Int. J. Netw. Secur., 14 (6): 320-323 (2012)Multi-Task Learning and Multimodal Fusion for Road Segmentation., , , , and . IEEE Access, (2023)Efficient hierarchical identity-based signatures from lattices., , and . Int. J. Electron. Secur. Digit. Forensics, 5 (1): 1-10 (2013)Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications., , , , , , and . BigCom, volume 9784 of Lecture Notes in Computer Science, page 13-26. Springer, (2016)Insecurity of an efficient certificateless aggregate signature with constant pairing computations., , and . Inf. Sci., (2014)A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time., , , , and . IEEE Trans. Network and Service Management, 15 (4): 1197-1206 (2018)Personalized Privacy-Preserving Data Aggregation for Histogram Estimation., , , , , and . GLOBECOM, page 1-6. IEEE, (2015)An Efficient Task Assignment Mechanism for Crowdsensing Systems., , , , , and . ICCCS (2), volume 10040 of Lecture Notes in Computer Science, page 14-24. (2016)A novel distributed covert channel in HTTP., , , and . Secur. Commun. Networks, 7 (6): 1031-1041 (2014)Security of a biometric identity-based encryption scheme, , and . CoRR, (2011)