Author of the publication

Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud.

, , and . IEICE Transactions, 100-A (5): 1257-1261 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerating cogent confabulation: An exploration in the architecture design space., , , , , and . IJCNN, page 1292-1300. IEEE, (2008)Research on Hardware-in-the-Loop Simulation for Advanced Front-Lighting System., , , and . PACIIA (2), page 671-675. IEEE Computer Society, (2008)978-0-7695-3490-9.Secure Identity-based Threshold Broadcast Encryption in the Standard Model., , and . JNW, 6 (11): 1602-1609 (2011)Traffic Jam Detection Based on Corner Feature of Background Scene In Video-Based ITS., , , , and . ICNSC, page 614-619. IEEE, (2008)New Constructions of Identity-based Broadcast Encryption without Random Oracles., , and . TIIS, 5 (2): 428-439 (2011)Identity-based Threshold Broadcast Encryption in the Standard Model., , and . TIIS, 4 (3): 400-410 (2010)A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heterogeneous High-Performance Computing Cluster., , , , and . IEEE Trans. Computers, 62 (5): 886-899 (2013)New Construction of Short Hierarchical ID-Based Signature in the Standard Model., , and . Fundam. Inform., 90 (1-2): 191-201 (2009)Object-Based Coding for Plenoptic Videos., , , and . IEEE Trans. Circuits Syst. Video Techn., 20 (4): 548-562 (2010)High-Performance Computing on the Intel® Xeon Phi™ - How to Fully Exploit MIC Architectures, , , , , , and . Springer, (2014)