From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage., , , , , и . IEEE Trans. Serv. Comput., 15 (3): 1664-1677 (2022)PriMal: Cloud-Based Privacy-Preserving Malware Detection., , , , , и . ACISP (2), том 10343 из Lecture Notes in Computer Science, стр. 153-172. Springer, (2017)BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication., , , и . IEEE Trans. Inf. Forensics Secur., 10 (12): 2643-2652 (2015)Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)On the Security of LWE Cryptosystem against Subversion Attacks., , , , и . Comput. J., 63 (4): 495-507 (2020)Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption., , и . ASIACRYPT (2), том 12492 из Lecture Notes in Computer Science, стр. 98-128. Springer, (2020)SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition., , , и . ACISP, том 12248 из Lecture Notes in Computer Science, стр. 309-329. Springer, (2020)One-Round Strong Oblivious Signature-Based Envelope., , , , , и . ACISP (2), том 9723 из Lecture Notes in Computer Science, стр. 3-20. Springer, (2016)Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage., , , , и . IEEE Trans. Inf. Forensics Secur., 11 (4): 789-798 (2016)Practical privacy-preserving deep packet inspection outsourcing., , , , и . Concurr. Comput. Pract. Exp., (2019)