Author of the publication

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.

, , , , , and . IEEE Trans. Inf. Forensics Secur., 10 (9): 1993-2006 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Microdata Masking Techniques.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds., , and . Inf. Sci., (2018)Generating Deep Learning Model-Specific Explanations at the End User's Side., , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 30 (Supplement-2): 255-278 (December 2022)Efficient privacy-preserving implicit authentication., and . Comput. Commun., (2018)Practical secure and privacy-preserving scheme for value-added applications in VANETs., , , , and . Comput. Commun., (2015)Differentially private data publishing via optimal univariate microaggregation and record perturbation., and . Knowl. Based Syst., (2018)Full Secure Key Exchange and Authentication with no Previously Shared Secrets., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 665-669. Springer, (1989)Big Data Privacy: Challenges to Privacy Principles and Models., and . Data Sci. Eng., 1 (1): 21-28 (2016)A distributed architecture for scalable private RFID tag identification., , , and . Comput. Networks, 51 (9): 2268-2279 (2007)Co-Utility: Self-Enforcing Protocols without Coordination Mechanisms., , and . CoRR, (2015)