default search action
Nasima Begum
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c14]Nasima Begum, Toru Nakanishi:
Issuer-Revocable Issuer-Hiding Attribute-Based Credentials Using an Accumulator. candar 2023: 93-99 - 2022
- [j9]Nasima Begum, Toru Nakanishi:
An Efficient Revocable Delegatable Anonymous Credential System Using an Accumulator. J. Inf. Process. 30: 706-717 (2022) - [c13]Saqib Sizan Khan, Ashraful Haque, Nipa Khatun, Nasima Begum, Nusrat Jahan, Tanjina Helaly:
An Evaluation of BdSL 49 Dataset Using Transfer Learning Techniques: A Review. TCCE 2022: 437-447 - 2021
- [j8]Nasima Begum, Md. Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md. Rashedul Islam, Md. Ezharul Islam:
User Authentication Based on Handwriting Analysis of Pen-Tablet Sensor Data Using Optimal Feature Selection Model. Future Internet 13(9): 231 (2021) - 2020
- [c12]Nasima Begum, Toru Nakanishi:
An Accumulator-Based Revocation in Delegatable Anonymous Credentials. CANDAR (Workshops) 2020: 314-320 - [c11]Md. Azim Hossain Akash, Nasima Begum, Sayma Rahman, Jungpil Shin, Md. Amiruzzaman, Md. Rashedul Islam:
User Authentication Through Pen Tablet Data Using Imputation and Flatten Function. ICKII 2020: 208-211
2010 – 2019
- 2019
- [j7]Nasima Begum, Toru Nakanishi:
Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation. J. Inf. Process. 27: 508-516 (2019) - [c10]Abdullah Al Omar, Rabeya Bosri, Mohammad Shahriar Rahman, Nasima Begum, Md. Zakirul Alam Bhuiyan:
Towards Privacy-preserving Recommender System with Blockchains. DependSys 2019: 106-118 - [c9]Parisa Mehera, Muhammad Firoz Mridha, Nasima Begum, Md. Mohaiminul Islam:
Internal Abnormalities' Detection of Human Body Analyzing Skin Images Using Convolutional Neural Network. IJCCI 2019: 615-628 - 2018
- [c8]Nasima Begum, Toru Nakanishi:
Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation. ISITA 2018: 80-84 - 2017
- [j6]Nasima Begum, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Multi-Valued Sequences Generated by Power Residue Symbols over Odd Characteristic Fields. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(4): 922-929 (2017) - [j5]Shahidatul Sadiah, Toru Nakanishi, Nasima Begum, Nobuo Funabiki:
Accumulator for Monotone Formulas and its Application to Anonymous Credential System. J. Inf. Process. 25: 949-961 (2017) - 2016
- [j4]Yasuyuki Nogami, Satoshi Uehara, Kazuyoshi Tsuchiya, Nasima Begum, Hiroto Ino, Robert H. Morelos-Zaragoza:
A Multi-Value Sequence Generated by Power Residue Symbol and Trace Function over Odd Characteristic Field. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(12): 2226-2237 (2016) - [j3]Shoma Kajitani, Yasuyuki Nogami, Shunsuke Miyoshi, Thomas H. Austin, Md. Al-Amin Khandaker, Nasima Begum, Sylvain Duquesne:
Web-based Volunteer Computing for Solving the Elliptic Curve Discrete Logarithm Problem. Int. J. Netw. Comput. 6(2): 181-194 (2016) - [c7]Nasima Begum, Toru Nakanishi, Shahidatul Sadiah, Md. Ezharul Islam:
Implementation of a Revocable Group Signature Scheme with Compact Revocation List Using Accumulator. CANDAR 2016: 610-615 - [c6]Norito Jitsui, Yasuyuki Nogami, Hwajeong Seo, Nasima Begum:
Efficient operation over F(2 4)2 for security technologies. ICCE-TW 2016: 1-2 - 2015
- [c5]Hiroto Ino, Yasuyuki Nogami, Nasima Begum, Satoshi Uehara, Robert Morelos-Zaragoza, Kazuyoshi Tsuchiya:
A Consideration on Crosscorrelation of a Kind of Trace Sequences over Finite Field. CANDAR 2015: 484-486 - [c4]Nasima Begum, Toru Nakanishi, Yasuyuki Nogami:
Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes. ICCE-TW 2015: 376-377 - 2013
- [j2]Nasima Begum, Toru Nakanishi, Nobuo Funabiki:
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2422-2433 (2013) - [c3]Nasima Begum, Toru Nakanishi, Nobuo Funabiki:
Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs. GCCE 2013: 530-533 - 2012
- [c2]Nasima Begum, Toru Nakanishi, Nobuo Funabiki:
Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations. ICNC 2012: 264-268 - [c1]Nasima Begum, Toru Nakanishi, Nobuo Funabiki:
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. ICISC 2012: 495-509 - 2010
- [j1]Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M. Ruhul Amin:
Fingerprint Detection Using Canny Filter and DWT, a New Approach. J. Inf. Process. Syst. 6(4): 511-520 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint