Author of the publication

Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption.

, , and . USENIX ATC, page 37-52. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BigDataBench: A Dwarf-based Big Data and AI Benchmark Suite., , , , , , , , , and 2 other author(s). CoRR, (2018)SMART: Design and Evaluation of a Collaborative Museum Visiting Application., , , , , , , and . CDVE, volume 9320 of Lecture Notes in Computer Science, page 57-64. Springer, (2015)Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 592-609. Springer, (2013)Filters navigation and positioning based on mining vehicle motion model., , , , , and . CACRE, page 31-36. IEEE, (2020)Operator splitting based structure-preserving numerical schemes for the mass-conserving convective Allen-Cahn equation., , , and . J. Comput. Phys., (2023)A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud., , , and . INCoS, page 1-7. IEEE, (2012)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , and . ACM Trans. Storage, 16 (1): 4:1-4:30 (2020)Efficient Network Path Verification for Policy-routedQueries., , and . CODASPY, page 319-328. ACM, (2016)Spatial Non-Maximum Suppression for Object Detection using Correlation and Dynamic Thresholds., , , , and . ISOCC, page 264-265. IEEE, (2021)Balancing storage efficiency and data confidentiality with tunable encrypted deduplication., , , , and . EuroSys, page 22:1-22:15. ACM, (2020)