Author of the publication

A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol.

, , , and . IEEE Open J. Comput. Soc., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special section: Green computing., , and . Future Generation Comp. Syst., 28 (2): 368-370 (2012)Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks., , , and . Wireless Communications and Mobile Computing, 14 (2): 221-231 (2014)Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks., , and . IEEE Trans. Computers, 64 (6): 1670-1679 (2015)Reliable Bulk-Data Dissemination in Delay Tolerant Networks., , and . IEEE Trans. Parallel Distrib. Syst., 25 (8): 2180-2189 (2014)DSP application in e-commerce security., , , , and . ICASSP, page 1005-1008. IEEE, (2001)Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology., , , and . AutoID, page 35-40. IEEE, (2007)A Cloud Security Assessment System Based on Classifying and Grading., , , and . IEEE Cloud Computing, 2 (2): 58-67 (2015)An Efficient Privacy-Preserving Ranked Keyword Search Method., , , , , , and . IEEE Trans. Parallel Distrib. Syst., 27 (4): 951-963 (2016)A survey of network anomaly detection techniques., , and . J. Network and Computer Applications, (2016)Editorial: Advances in network and system security., , and . Computers & Security, 30 (5): 295-296 (2011)