Author of the publication

New Paradigm of Inference Control with Trusted Computing.

, , and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 243-258. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiuser private queries over encrypted databases., , , and . Int. J. Appl. Cryptogr., 1 (4): 309-319 (2009)On Lightweight Security Enforcement in Cyber-Physical Systems., , , and . LightSec, volume 9542 of Lecture Notes in Computer Science, page 97-112. Springer, (2015)Authenticated CAN Communications Using Standardized Cryptographic Techniques., , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 330-343. (2016)A Practical Password-Based Two-Server Authentication and Key Exchange System., , and . IEEE Trans. Dependable Secur. Comput., 3 (2): 105-114 (2006)Ramp Hyper-invertible Matrices and Their Applications to MPC Protocols., , , and . ASIACRYPT (1), volume 14438 of Lecture Notes in Computer Science, page 204-236. Springer, (2023)Enabling Use of Single Password over Multiple Servers in Two-Server Model., and . CIT, page 846-850. IEEE Computer Society, (2010)Security Analysis and Fix of an Anonymous Credential System., , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 537-547. Springer, (2005)A Privacy Preserving Rental System., and . ISC, volume 3650 of Lecture Notes in Computer Science, page 59-73. Springer, (2005)Security Analysis and Improvement of the Global Key Recovery System., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 17-24. Springer, (2002)Practical private data matching deterrent to spoofing attacks., , and . CIKM, page 852-853. ACM, (2006)