Author of the publication

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.

, , , , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 159-178. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-group Secret Sharing for Secure Cloud Storage Service., , , , and . IMCOM, page 63:1-63:8. ACM, (2016)CMCAP: Ephemeral Sandboxes for Adaptive Access Control., , and . SACMAT, page 207-212. ACM, (2019)Investing Data with Untrusted Parties using HE., , , and . SECRYPT, page 845-853. SCITEPRESS, (2021)Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations., , , and . ISIT, page 1432-1436. IEEE, (2006)Enhancing the Security of the MAVLink with Symmetric Authenticated Encryption for Drones., , , and . IOTSMS, page 58-65. IEEE, (2024)Generalized Oblivious Transfer Protocols Based on Noisy Channels., and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 219-229. Springer, (2001)Verifying OAuth Implementations Through Encrypted Network Analysis., , and . SACMAT, page 227-229. ACM, (2019)Semantic security for the McEliece cryptosystem without random oracles., , , and . Des. Codes Cryptogr., 49 (1-3): 289-305 (2008)An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 47-58. Springer, (2014)Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions., , , , and . J. Supercomput., 73 (10): 4275-4301 (2017)