Author of the publication

Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.

, , , , and . IEEE Syst. J., 17 (2): 2101-2112 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The robustness of interdependent networks under the interplay between cascading failures and virus propagation., , , , and . CoRR, (2016)Network Connections Information Extraction of 64-Bit Windows 7 Memory Images., , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 90-98. Springer, (2010)Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System., , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 122-130. Springer, (2010)A Malware Detection Approach Based on Deep Learning and Memory Forensics., , , , , and . Symmetry, 15 (3): 758 (February 2023)The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude., , , and . Cryptogr. Commun., 12 (4): 675-683 (2020)A lightweight delegated private set intersection cardinality protocol., , , and . Comput. Stand. Interfaces, (January 2024)A reputation-based dynamic reorganization scheme for blockchain network sharding., , , , and . Connect. Sci., (December 2024)Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach., , , , and . IEEE Netw., 36 (4): 166-173 (2022)Video forensics research based on authenticity and integrity., , , , and . ICIA, page 1223-1226. IEEE, (2016)Algorithm for Agent Collaborative Learning Task Allocation Based Graph Framework., , and . BIFE, page 215-218. IEEE Computer Society, (2009)