Author of the publication

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.

, , , , and . J. Comput. Syst. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A time-synchronized ZigBee building network for smart water management., , , , , , and . INDIN, page 1219-1222. IEEE, (2017)Securing Smart Grid In-Network Aggregation through False Data Detection., and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 4 (10): e5 (2017)Exploring the Security of Certificate Transparency in the Wild., , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 453-470. Springer, (2020)Understanding rating behavior based on moral foundations: The case of Yelp reviews., and . IEEE BigData, page 3938-3945. IEEE Computer Society, (2017)Cyber-Physical Systems Security - A Survey., , , and . IEEE Internet Things J., 4 (6): 1802-1831 (2017)$AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware., , , , , and . ICSE, page 1-12. ACM, (2022)Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems., , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 343-363. Springer, (2022)Automaton segmentation: a new approach to preserve privacy in xml information brokering., , , , and . CCS, page 508-518. ACM, (2007)A Content-Aware Trust Index for Online Review Spam Detection., and . DBSec, volume 10359 of Lecture Notes in Computer Science, page 489-508. Springer, (2017)Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures., , , , and . J. Comput. Syst. Sci., (2021)