2025
Diverging Assessment: A Student Perspective.
Proceedings of the 30th ACM Conference on Innovation and Technology in Computer Science Education V. 1, 2025
2024
OLBS: Oblivious Location-Based Services.
IEEE Trans. Inf. Forensics Secur., 2024
Policy-Based Remote User Authentication From Multi-Biometrics.
Comput. J., 2024
Diverging assessments: What, Why, and Experiences.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Mitigation of Gradient Inversion Attacks in Federated Learning with Private Adaptive Optimization.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting.
Comput. J., October, 2023
Targeted Context-Based Attacks on Trust Management Systems in IoT.
IEEE Internet Things J., July, 2023
Visualization and Cybersecurity in the Metaverse: A Survey.
J. Imaging, January, 2023
2022
A Blockchain Based Secure IoT System Using Device Identity Management.
Sensors, 2022
2021
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021
A Practical Forward-Secure DualRing.
IACR Cryptol. ePrint Arch., 2021
2020
Leakage-resilient biometric-based remote user authentication with fuzzy extractors.
Theor. Comput. Sci., 2020
A new framework for privacy-preserving biometric-based remote user authentication.
J. Comput. Secur., 2020
A New Construction for Linkable Secret Handshake.
Comput. J., 2020
A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability.
Proceedings of the Second IEEE International Conference on Trust, 2020
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019
Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Context-Aware Trust Management System for IoT Applications with Multiple Domains.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks.
IEEE Access, 2018
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018
DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018
2017
Lightweight Mutual Authentication for IoT and Its Applications.
IEEE Trans. Sustain. Comput., 2017
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptol. ePrint Arch., 2017
Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
2015
Vulnerabilities of an ECC-based RFID authentication scheme.
Secur. Commun. Networks, 2015
Shared RFID ownership transfer protocols.
Comput. Stand. Interfaces, 2015
Anonymous Yoking-Group Proofs.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
2013
On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013
Secure RFID Ownership Transfer Protocols.
Proceedings of the Information Security Practice and Experience, 2013
2011
Efficient Self-certified Signatures with Batch Verification.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011