Author of the publication

Geometric Searchable Encryption Without False Positive And Its Applications.

, , , , and . Comput. J., 66 (9): 2155-2168 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Geometric Searchable Encryption Without False Positive And Its Applications., , , , and . Comput. J., 66 (9): 2155-2168 (September 2023)A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing., , , , and . IEEE Access, (2019)Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention., , , , , , and . CoRR, (2023)A Privacy-Preserving Data Feed Scheme for Smart Contracts., , , , and . IEICE Trans. Inf. Syst., 105-D (2): 195-204 (2022)MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality., , , , , , , , , and 1 other author(s). PST, page 1-7. IEEE, (2023)CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts., , , , , , , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 449-468. Springer, (2022)Privacy Protection for Medical Data Sharing in Smart Healthcare., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 100:1-100:18 (2020)Fully Discover the Balance of Lightning Network Payment Channels., , , and . WASA (1), volume 12937 of Lecture Notes in Computer Science, page 159-173. Springer, (2021)Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic., , , , , , and . WWW, page 1991-1999. ACM, (2023)Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds., , , , , and . ACM TUR-C, page 164-165. ACM, (2023)