Author of the publication

New efficient constructions of verifiable data streaming with accountability.

, , , and . Ann. des Télécommunications, 74 (7-8): 483-499 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network security defense model based on firewall and IPS., , and . J. Intell. Fuzzy Syst., 39 (6): 8961-8969 (2020)Secure string pattern query for open data initiative., , , , and . J. Inf. Secur. Appl., (2019)Active hashing with joint data example and tag selection., , , and . SIGIR, page 405-414. ACM, (2014)TuFast: A Lightweight Parallelization Library for Graph Analytics., , and . ICDE, page 710-721. IEEE, (2019)Live Demonstration: Wearable Body Area Network System Based on Low Power Body Channel Communication., , , and . BioCAS, page 1. IEEE, (2019)A Mixed Integer Linear Programming Model for Production Scheduling of Non-Pipelined Wells., , , , and . ICCA, page 1397-1404. IEEE, (2019)Dilated Convolution and Feature Fusion SSD Network for Small Object Detection in Remote Sensing Images., , , and . IEEE Access, (2020)An Almost Non-interactive Order Preserving Encryption Scheme., , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 87-100. Springer, (2018)Collateral damage: Exchange controls and international trade, and . Journal of International Money and Finance, 26 (5): 841--863 (September 2007)A Vision-Based Displacement Measurement System for Foundation Pit., , , , , and . IEEE Trans. Instrum. Meas., (2023)