Author of the publication

Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations.

, , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 529-548. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices., , , , , , , and . DSN, page 454-465. IEEE Computer Society, (2018)Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations., , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 529-548. Springer, (2018)Dynamic Path Selection Model Based on Logistic Regression for the Shunt Point of Highway., and . ITITS (1), volume 454 of Advances in Intelligent Systems and Computing, page 155-171. (2015)When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks., , , , and . CoRR, (2018)Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey., , , and . Cybersecur., 1 (1): 1 (2018)Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience., , , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 112-132. Springer, (2018)MobiPluto: File System Friendly Deniable Storage for Mobile Devices., , , and . ACSAC, page 381-390. ACM, (2015)Making a good thing better: enhancing password/PIN-based user authentication with smartwatch., , , , and . Cybersecur., 1 (1): 7 (2018)Employing Smartwatch for Enhanced Password Authentication., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 691-703. Springer, (2017)MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices., , , , , and . ISC, volume 8783 of Lecture Notes in Computer Science, page 555-567. Springer, (2014)