​
Login / Signup
Nasima Begum
ORCID
Publication Activity (10 Years)
Years Active: 2010-2023
Publications (10 Years): 16
Top Topics
Hough Transform
Trust Negotiation
Elliptic Curve
Group Signature Scheme
Top Venues
J. Inf. Process.
CANDAR
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
ICCE-TW
</>
Publications
</>
Nasima Begum
,
Toru Nakanishi
Issuer-Revocable Issuer-Hiding Attribute-Based Credentials Using an Accumulator.
candar
(2023)
Saqib Sizan Khan
,
Ashraful Haque
,
Nipa Khatun
,
Nasima Begum
,
Nusrat Jahan
,
Tanjina Helaly
An Evaluation of BdSL 49 Dataset Using Transfer Learning Techniques: A Review.
TCCE
(2022)
Nasima Begum
,
Toru Nakanishi
An Efficient Revocable Delegatable Anonymous Credential System Using an Accumulator.
J. Inf. Process.
30 (2022)
Nasima Begum
,
Md. Azim Hossain Akash
,
Sayma Rahman
,
Jungpil Shin
,
Md. Rashedul Islam
,
Md. Ezharul Islam
User Authentication Based on Handwriting Analysis of Pen-Tablet Sensor Data Using Optimal Feature Selection Model.
Future Internet
13 (9) (2021)
Md. Azim Hossain Akash
,
Nasima Begum
,
Sayma Rahman
,
Jungpil Shin
,
Md. Amiruzzaman
,
Md. Rashedul Islam
User Authentication Through Pen Tablet Data Using Imputation and Flatten Function.
ICKII
(2020)
Nasima Begum
,
Toru Nakanishi
An Accumulator-Based Revocation in Delegatable Anonymous Credentials.
CANDAR (Workshops)
(2020)
Nasima Begum
,
Toru Nakanishi
Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation.
J. Inf. Process.
27 (2019)
Parisa Mehera
,
Muhammad F. Mridha
,
Nasima Begum
,
Md. Mohaiminul Islam
Internal Abnormalities' Detection of Human Body Analyzing Skin Images Using Convolutional Neural Network.
IJCCI
(2019)
Abdullah Al Omar
,
Rabeya Bosri
,
Mohammad Shahriar Rahman
,
Nasima Begum
,
Md. Zakirul Alam Bhuiyan
Towards Privacy-preserving Recommender System with Blockchains.
DependSys
(2019)
Nasima Begum
,
Toru Nakanishi
Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation.
ISITA
(2018)
Shahidatul Sadiah
,
Toru Nakanishi
,
Nasima Begum
,
Nobuo Funabiki
Accumulator for Monotone Formulas and its Application to Anonymous Credential System.
J. Inf. Process.
25 (2017)
Nasima Begum
,
Yasuyuki Nogami
,
Satoshi Uehara
,
Robert H. Morelos-Zaragoza
Multi-Valued Sequences Generated by Power Residue Symbols over Odd Characteristic Fields.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(4) (2017)
Nasima Begum
,
Toru Nakanishi
,
Shahidatul Sadiah
,
Md. Ezharul Islam
Implementation of a Revocable Group Signature Scheme with Compact Revocation List Using Accumulator.
CANDAR
(2016)
Norito Jitsui
,
Yasuyuki Nogami
,
Hwajeong Seo
,
Nasima Begum
Efficient operation over F(2 4)2 for security technologies.
ICCE-TW
(2016)
Shoma Kajitani
,
Yasuyuki Nogami
,
Shunsuke Miyoshi
,
Thomas H. Austin
,
Md. Al-Amin Khandaker
,
Nasima Begum
,
Sylvain Duquesne
Web-based Volunteer Computing for Solving the Elliptic Curve Discrete Logarithm Problem.
Int. J. Netw. Comput.
6 (2) (2016)
Yasuyuki Nogami
,
Satoshi Uehara
,
Kazuyoshi Tsuchiya
,
Nasima Begum
,
Hiroto Ino
,
Robert H. Morelos-Zaragoza
A Multi-Value Sequence Generated by Power Residue Symbol and Trace Function over Odd Characteristic Field.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(12) (2016)
Nasima Begum
,
Toru Nakanishi
,
Yasuyuki Nogami
Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes.
ICCE-TW
(2015)
Hiroto Ino
,
Yasuyuki Nogami
,
Nasima Begum
,
Satoshi Uehara
,
Robert Morelos-Zaragoza
,
Kazuyoshi Tsuchiya
A Consideration on Crosscorrelation of a Kind of Trace Sequences over Finite Field.
CANDAR
(2015)
Nasima Begum
,
Toru Nakanishi
,
Nobuo Funabiki
Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs.
GCCE
(2013)
Nasima Begum
,
Toru Nakanishi
,
Nobuo Funabiki
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(12) (2013)
Nasima Begum
,
Toru Nakanishi
,
Nobuo Funabiki
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System.
ICISC
(2012)
Nasima Begum
,
Toru Nakanishi
,
Nobuo Funabiki
Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations.
ICNC
(2012)
Md. Imdadul Islam
,
Nasima Begum
,
Mahbubul Alam
,
M. Ruhul Amin
Fingerprint Detection Using Canny Filter and DWT, a New Approach.
J. Inf. Process. Syst.
6 (4) (2010)