From post

Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.

, , , и . ACM Conference on Computer and Communications Security, стр. 79-93. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Selections on Encrypted Multi-writer Streams., , и . ACM Trans. Priv. Secur., 25 (1): 7:1-7:33 (2022)A lightweight privacy preserving SMS-based recommendation system for mobile users., , , , , и . Knowl. Inf. Syst., 40 (1): 49-77 (2014)Leakage Cell Probe Model: Lower Bounds for Key-Equality Mitigation in Encrypted Multi-Maps., , и . IACR Cryptology ePrint Archive, (2019)Information security for sensors by overwhelming random sequences and permutations., , , , и . Ad Hoc Networks, (2014)A Distributed Implementation of the Certified Information Access Service., , , , и . ESORICS, том 5283 из Lecture Notes in Computer Science, стр. 396-410. Springer, (2008)Improved OR Composition of Sigma-Protocols., , , , и . IACR Cryptology ePrint Archive, (2015)Reversibility and Mixing Time for Logit Dynamics with Concurrent Updates, , , , и . CoRR, (2012)Metastability of Logit Dynamics for Coordination Games, , , и . CoRR, (2011)Answering queries using pairings., , и . CoRR, (2014)Convergence to Equilibrium of Logit Dynamics for Strategic Games., , , , и . Algorithmica, 76 (1): 110-142 (2016)