Author of the publication

Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison.

, , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

(2, n) secret sharing scheme for gray and color images based on Boolean operation., , , and . Sci. China Inf. Sci., 55 (5): 1151-1161 (2012)Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison., , , and . IEEE Access, (2018)An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes., , , and . IIH-MSP, page 369-372. IEEE, (2013)A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle., , , , and . Theor. Comput. Sci., (2016)Privacy-Preserving Proximity Detection Framework for Location-Based Services., , and . NaNA, page 99-106. IEEE, (2021)Combined DTCWT-SVD-Based Video Watermarking Algorithm Using Finite State Machine., , , , , and . ICACI, page 179-183. IEEE, (2019)A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 82-95. Springer, (2014)Key Management Scheme Based on Secret Sharing for Wireless Sensor Network., , and . EIDWT, page 574-578. IEEE Computer Society, (2013)Symmetric Encryption Solutions to Millionaire's Problem and Its Extension., , , and . ICDIM, page 531-537. IEEE, (2006)A distributed secret share update scheme with public verifiability for ad hoc network., , , and . Secur. Commun. Networks, 8 (8): 1485-1493 (2015)