• Publications
  • Influence
On securing open networks through trust and reputation - architecture, challenges and solutions
We identify five important attributes of an elemental trust relation, provide comprehensive understanding of reputation-based trust architecture which includes three basic components, and introduce the corresponding requirements and research challenges in each component. Expand
  • 5
A Design of Cryptographic Hash Function Group with Variable Output-Length Based on SHA-1
We propose a cryptographic hash function, namely SHA-V, with variable output-length based on SHA-1, HAVAL and HAS-V. Expand
  • 1
Interactive Protocol for Privacy-preserving K-mean Clustering