35 results on '"Chen, Liqun"'
Search Results
2. Attribute-Based Signatures with Controllable Linkability
3. Enforcing Sticky Policies with TPM and Virtualization
4. A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost
5. Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes
6. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
7. Anonymous Authentication for RFID Systems
8. On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)
9. Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
10. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
11. Fine-grained information flow control using attributes.
12. Bibliometrics of Machine Learning Research Using Homomorphic Encryption.
13. Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
14. Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids
15. Threshold Anonymous Announcement in VANETs.
16. Formal analysis of privacy in Direct Anonymous Attestation schemes.
17. PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution
18. GDPR – Challenges for Reconciling Legal Rules with Technical Reality
19. PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
20. End-to-end policy based encryption techniques for multi-party data management.
21. A Simple Algorithm for Estimating Distribution Parameters from -Dimensional Randomized Binary Responses
22. Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
23. SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption
24. Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions
25. Hypercubes and Private Information Retrieval
26. A Formal Concept of Domain Pseudonymous Signatures
27. Anonymizing Bitcoin Transaction
28. Secure and Efficient Construction of Broadcast Encryption with Dealership
29. Secure Naïve Bayesian Classification over Encrypted Data in Cloud
30. Unpicking PLAID : A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol
31. Blinded Diffie-Hellman : Preventing Eavesdroppers from Tracking Payments
32. Privacy Enhanced Trusted Network Connect
33. A PrivacyCA for Anonymity and Trust
34. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly
35. Privacy of Recent RFID Authentication Protocols
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.