| Publication | Date of Publication | Type |
|---|
| An incentive compatible ZD strategy-based data sharing model for federated learning: a perspective of iterated prisoner's dilemma | 2024-06-13 | Paper |
| An efficient IoT forensic approach for the evidence acquisition and analysis based on network link | 2023-02-16 | Paper |
| CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones | 2022-10-14 | Paper |
| WOTS-S: a quantum secure compact signature scheme for distributed ledger | 2021-11-23 | Paper |
| An identity-based blind signature scheme using lattice with provable security | 2021-05-14 | Paper |
| Blockchain-based system for secure outsourcing of bilinear pairings | 2021-04-19 | Paper |
| Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data | 2020-12-10 | Paper |
| Game theoretic security of quantum bit commitment | 2020-10-07 | Paper |
| Jo-DPMF: differentially private matrix factorization learning through joint optimization | 2020-09-22 | Paper |
| Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving | 2020-05-06 | Paper |
| Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks | 2019-12-10 | Paper |
| Neighbor-considered migration facilitates cooperation in prisoner's dilemma games | 2019-06-21 | Paper |
| Privacy-preserving certificateless provable data possession scheme for big data storage on cloud | 2019-04-29 | Paper |
| Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks | 2019-03-27 | Paper |
| A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps | 2019-03-27 | Paper |
| Context-oriented web application protection model | 2019-03-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4639666 | 2018-05-11 | Paper |
| Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification | 2018-02-23 | Paper |
| Two-round password-only authenticated key exchange in the three-party setting | 2017-09-27 | Paper |
| Secure outsourcing of modular exponentiations under single untrusted programme model | 2017-09-15 | Paper |
| Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases | 2017-09-07 | Paper |
| A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols | 2017-02-07 | Paper |
| Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy | 2016-08-31 | Paper |
| Towards Lightweight Anonymous Entity Authentication for IoT Applications | 2016-08-31 | Paper |
| On Lightweight Security Enforcement in Cyber-Physical Systems | 2016-02-22 | Paper |
| Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode | 2010-03-03 | Paper |
| An improved identity-based key agreement protocol and its security proof | 2009-03-24 | Paper |
| Secure key establishment | 2008-10-29 | Paper |
| Strongly-Secure Identity-Based Key Agreement and Anonymous Extension | 2008-06-24 | Paper |
| Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication | 2008-06-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5459552 | 2008-04-29 | Paper |
| Errors in Computational Complexity Proofs for Protocols | 2008-03-18 | Paper |
| Examining Indistinguishability-Based Proof Models for Key Establishment Protocols | 2008-03-18 | Paper |
| An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys | 2007-09-07 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3431075 | 2007-04-05 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |