From post

Lightweight Threshold Private Set Intersection via Oblivious Transfer.

, , , , , и . WASA (3), том 12939 из Lecture Notes in Computer Science, стр. 108-116. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leakage-Resilient Functional Encryption via Pair Encodings., , , , и . ACISP (1), том 9722 из Lecture Notes in Computer Science, стр. 443-460. Springer, (2016)Collusion Resistant Watermarkable PRFs from Standard Assumptions., , , и . CRYPTO (1), том 12170 из Lecture Notes in Computer Science, стр. 590-620. Springer, (2020)Rational secret sharing with semi-rational players., , и . Int. J. Grid Util. Comput., 3 (1): 59-67 (2012)Towards leakage-resilient fine-grained access control in fog computing., , , , и . Future Gener. Comput. Syst., (2018)Post-Quantum Universal Composable OT Based on Key Exchange., , и . IEEE Access, (2020)Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON., , , и . CT-RSA, том 9048 из Lecture Notes in Computer Science, стр. 181-198. Springer, (2015)Perfect Concurrent Signature Protocol for Symmetric Participant., , и . CIS (2), стр. 273-277. IEEE Computer Society, (2008)978-0-7695-3508-1.Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System., , , и . CloudComp, том 197 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 123-132. Springer, (2016)Convertible Perfect Concurrent Signature Protocol., , и . CIS, стр. 352-356. IEEE Computer Society, (2010)A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol., , , , , , и . Trustcom/BigDataSE/ISPA, стр. 670-677. IEEE, (2016)