Author of the publication

Optimized verifiable delegated private set intersection on outsourced private datasets.

, , , , and . Comput. Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Deploying Networklet., , , , , , and . GLOBECOM, page 1-6. IEEE, (2017)New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems., , , and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 189-198. Springer, (2007)Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things., , and . IEEE Internet Things J., 9 (14): 12711-12722 (2022)A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree., , , and . J. Softw., 4 (1): 73-80 (2009)Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes., , , , , , and . J. Networks, 5 (6): 634-641 (2010)Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System., , , , , and . ISCC, page 857-863. IEEE, (2023)Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method., , , , and . CSE/EUC (1), page 866-869. IEEE Computer Society, (2017)Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT., , , , , and . TrustCom, page 556-564. IEEE, (2022)Networklet: Concept and Deployment., , , , , , and . ICDCS, page 2624-2625. IEEE Computer Society, (2017)Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase., , , and . 3PGCIC, page 840-843. IEEE Computer Society, (2015)