Author of the publication

Efficient Private Set Intersection Using Point-Value Polynomial Representation.

, and . Secur. Commun. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Estimating the Camera Parameters Based on Vanishing Points., , , , and . CISIS, volume 611 of Advances in Intelligent Systems and Computing, page 499-507. Springer, (2017)New Approach to Set Representation and Practical Private Set-Intersection Protocols., , , and . IEEE Access, (2019)Efficient Private Set Intersection Using Point-Value Polynomial Representation., and . Secur. Commun. Networks, (2020)Nonconvex-NLTV Regularization-Based SAR Image Feature Enhancement with Water Body Information Extraction Using QILU-1 SAR Data., , , , , and . IGARSS, page 2947-2950. IEEE, (2022)An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering., , , , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 686-695. Springer, (2017)An Efficient Private Set Intersection Protocol for the Cloud Computing Environments., , and . BigDataSecurity/HPSC/IDS, page 254-259. IEEE, (2020)Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image., , and . EIDWT, volume 6 of Lecture Notes on Data Engineering and Communications Technologies, page 475-488. Springer, (2017)A Delegated Offline Private Set Intersection Protocol for Cloud Computing Environments., and . ICCIR, page 735-739. ACM, (2022)Provably leakage-resilient three-party password-based authenticated key exchange., , and . J. Ambient Intell. Humaniz. Comput., 10 (1): 163-173 (2019)Fast Iterative Reconstruction Based on Condensed Hierarchy Tree., , , and . EIDWT, volume 6 of Lecture Notes on Data Engineering and Communications Technologies, page 390-399. Springer, (2017)