Author of the publication

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.

, and . IACR Cryptology ePrint Archive, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS., and . IACR Cryptology ePrint Archive, (2011)Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack., and . IACR Cryptology ePrint Archive, (2010)An Exact Upper Bound on the Lp Lebesgue Constant and The ∞-Rényi Entropy Power Inequality for Integer Valued Random Variables., , and . CoRR, (2018)Accelerated Stochastic Power Iteration., , , , and . CoRR, (2017)Dependency of current collapse on the device structure of GaN-based HEMTs., , , , , , , , , and . ASICON, page 1-4. IEEE, (2015)Dynamic characteristics and related trapping effects of GaN-based Fin-MISHEMTs., , , , , , , , , and . ASICON, page 584-587. IEEE, (2017)The refinement of a Q-matrix: Assessing methods to validate tasks to skills mapping., , and . EDM, page 208-311. International Educational Data Mining Society (IEDMS), (2014)Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing., , , , and . Comput. J., 57 (2): 241-254 (2014)Circularly polarized bistatic scattering from sastrugi surfaces., and . IGARSS, page 4928-4931. IEEE, (2017)GIANT: Globally Improved Approximate Newton Method for Distributed Optimization., , , and . CoRR, (2017)