Cited By
View all- Gao JZhang YZhong S(2024)Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile SensingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.332480221:4(3211-3226)Online publication date: Jul-2024
- Chen M(2024)Integrating Private and Accountable Threshold Signature Into Ciphertext-Policy Attribute-Based Encryption Supporting Collaboration Decryption2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC54092.2024.10831747(3893-3898)Online publication date: 6-Oct-2024
- Yogi MChakravarthy A(2023)Application of Distributed Constraint Optimization Technique for Privacy Preservation in Cyber-Physical SystemsIntelligent Cyber Physical Systems and Internet of Things10.1007/978-3-031-18497-0_24(319-327)Online publication date: 4-Feb-2023
- Show More Cited By