Author of the publication

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data., , and . Neural Computing and Applications, 20 (1): 143-150 (2011)Selection of Thermodynamic Models for Combinatorial Control of Multiple Transcription Factors in Early Differentiation of Embryonic Stem Cells., , and . BIOCOMP, page 650-656. CSREA Press, (2007)Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel., , and . INFOCOM, page 2156-2164. IEEE, (2011)Differentially private publication of general time-serial trajectory data., , and . INFOCOM, page 549-557. IEEE, (2015)Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework., , , , and . CSB, page 425-435. IEEE Computer Society, (2004)A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks., , , , and . ICC, page 789-793. IEEE, (2012)Adaptive learning routing algorithm of WSNs based autonomous decentralized system approach., and . ICNC, page 66-69. IEEE, (2010)Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising., , and . ICDCS, page 298-307. IEEE Computer Society, (2015)Incentive-compatible opportunistic routing for wireless networks., , , , and . MobiCom, page 303-314. ACM, (2008)On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for $k$ -Anonymity Location Privacy., , and . IEEE Trans. Information Forensics and Security, 11 (11): 2528-2541 (2016)