Author of the publication

An efficient quantum scheme for Private Set Intersection.

, , , , and . Quantum Inf. Process., 15 (1): 363-371 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel anonymous secret sharing scheme based on BP Artificial Neural Network., , and . ICNC, page 366-370. IEEE, (2012)Intrusion-resilient public cloud auditing scheme with authenticator update., , , and . Inf. Sci., (2020)MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs., , , , and . ICPADS, page 470-479. IEEE, (2019)DDoS detection and defense mechanism based on cognitive-inspired computing in SDN., , , and . Future Gener. Comput. Syst., (2019)Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time"., , and . Future Gener. Comput. Syst., (2018)RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers., , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 330-344. Springer, (2019)Differentially Private Combinatorial Cloud Auction., , , , , and . CoRR, (2020)PATH: privacy-preserving auction for heterogeneous spectrum allocations., , , , and . Wireless Networks, 25 (4): 1763-1776 (2019)Probabilistic matrix factorization with personalized differential privacy., , , and . Knowl. Based Syst., (2019)A novel anonymous authentication scheme without cryptography., , and . Trans. Emerg. Telecommun. Technol., 25 (9): 875-880 (2014)