Author of the publication

Efficiently secure multiparty computation based on homomorphic encryption.

, , , and . CCIS, page 343-349. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ISEK: An Information Security Knowledge Graph for CISP Knowledge System., , , , and . ICITCS, page 1-4. IEEE Computer Society, (2015)An Improved Fuzzy Test of Industrial Control System., , , and . ICCAE, page 233-237. ACM, (2018)An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , and . CCIS, page 234-238. IEEE, (2016)An Android malware detection method based on AndroidManifest file., , , , and . CCIS, page 239-243. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , and . CCIS, page 244-248. IEEE, (2016)Research on Ontology-Based Multi-source Engineering Information Retrieval in Integrated Environment of Enterprise., , and . IESA, page 277-282. IEEE Computer Society, (2009)Efficient data possession-checking protocol with deduplication in cloud., , , , and . IJDSN, (2017)A Novel Framework to Process the Quantity and Quality of User Behavior Data in Recommender Systems., , and . WAIM (1), volume 9658 of Lecture Notes in Computer Science, page 231-243. Springer, (2016)Efficiently secure multiparty computation based on homomorphic encryption., , , and . CCIS, page 343-349. IEEE, (2016)JTOWL: A JSON to OWL Converto., , and . Web-KRM@CIKM, page 13-14. ACM, (2014)