Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications., , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 115-146. Springer, (2019)Semantic Weaving for Context-Aware Web Service Composition., , and . WISE, volume 5802 of Lecture Notes in Computer Science, page 101-114. Springer, (2009)Programmable Order-Preserving Secure Index for Encrypted Database Query., and . IEEE CLOUD, page 502-509. IEEE Computer Society, (2012)Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography., , , and . ICMR, page 53-57. ACM, (2019)Query encrypted databases practically., and . CCS, page 1049-1051. ACM, (2012)Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual., , , , , and . AsiaCCS, page 859-871. ACM, (2021)User Authentication for Online Applications Using a USB-Based Trust Device., , , and . MobiSec, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 15-26. Springer, (2010)Cloud#: A Specification Language for Modeling Cloud., and . IEEE CLOUD, page 533-540. IEEE Computer Society, (2011)Efficient Processing of Encrypted Data in Honest-but-Curious Clouds.. CLOUD, page 970-974. IEEE Computer Society, (2016)Designing Smart Contract for Electronic Document Taxation., , , , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 199-213. Springer, (2019)