Author of the publication

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.

, , , , , , , , and . ISPEC, volume 13107 of Lecture Notes in Computer Science, page 327-344. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security., , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 228-246. Springer, (2018)Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy., , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 283-303. Springer, (2019)Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services., , , , and . TrustCom, page 307-317. IEEE, (2023)A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 516-528. Springer, (2017)Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 37-52. Springer, (2019)A Multi-client DSSE Scheme Supporting Range Queries., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 289-307. Springer, (2018)An Encrypted Database with Enforced Access Control and Blockchain Validation., , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 260-273. Springer, (2018)Result Pattern Hiding Searchable Encryption for Conjunctive Queries., , , , , , , , and . CCS, page 745-762. ACM, (2018)A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability., , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 380-398. Springer, (2023)Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach., , , , , , , , and . ISPEC, volume 13107 of Lecture Notes in Computer Science, page 327-344. Springer, (2021)