Author of the publication

Substring-searchable attribute-based encryption and its application for IoT devices.

, , , , , , and . Digit. Commun. Networks, 7 (2): 277-283 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving CNN feature extraction and retrieval over medical images., , and . Int. J. Intell. Syst., 37 (11): 9267-9289 (2022)Over-threshold multi-party private set operation protocols for lightweight clients., , , , , , and . Comput. Stand. Interfaces, (March 2024)Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries., , , , and . Trustcom/BigDataSE/ISPA, page 418-425. IEEE, (2016)Several Oblivious Transfer Variants in Cut-and-Choose Scenario., , , , and . Int. J. Inf. Secur. Priv., 9 (2): 1-12 (2015)An ORAM-based privacy preserving data sharing scheme for cloud storage., , , , , , and . J. Inf. Secur. Appl., (2018)Substring-searchable attribute-based encryption and its application for IoT devices., , , , , , and . Digit. Commun. Networks, 7 (2): 277-283 (2021)Efficient and secure outsourced approximate pattern matching protocol., , and . Soft Comput., 22 (4): 1175-1187 (2018)Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation., , , and . IACR Cryptol. ePrint Arch., (2014)Efficient ORAM Based on Binary Tree without Data Overflow and Evictions., , , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 596-607. Springer, (2015)Cut-and-Choose Bilateral Oblivious Transfer and Its Application., , , , and . TrustCom/BigDataSE/ISPA (1), page 384-391. IEEE, (2015)