Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Titanium: A Metadata-Hiding File-Sharing System with Malicious Security., , , and . NDSS, The Internet Society, (2022)A Reliability Guaranteed Solution for Data Storing and Sharing., , , , and . IEEE Access, (2021)A Generalized Authentication Scheme for Mobile Phones Using Gait Signals., , , , and . ICETE (Selected Papers), volume 585 of Communications in Computer and Information Science, page 386-407. Springer, (2015)On the Instability of Sensor Orientation in Gait Verification on Mobile Phone., , and . SECRYPT, page 148-159. SciTePress, (2015)Three-Dimensional Human Posture Recognition by Extremity Angle Estimation with Minimal IMU Sensor., , and . Sensors, 24 (13): 4306 (July 2024)Privacy-Preserving Verifiable Neural Network Inference Service., , and . ACSAC, page 683-698. IEEE, (2024)Practical and secure dynamic searchable encryption via oblivious access on distributed data structure., , and . ACSAC, page 302-313. ACM, (2016)Efficient Dynamic Proof of Retrievability for Cold Storage., , , , and . NDSS, The Internet Society, (2023)ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database., , , and . TPS-ISA, page 248-257. IEEE, (2022)A Multi-server ORAM Framework with Constant Client Bandwidth Blowup., , and . ACM Trans. Priv. Secur., 23 (1): 1:1-1:35 (2020)