Author of the publication

ICDM: An Encryption That Supports Unlimited Times Homomorphic Arithmetic Operations on Encrypted Data.

, , , , and . CSE, page 1220-1225. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Fragmented Bandwidth in a Staggered Striping Multimedia System., and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)New Entry Threats and Information Disclosure: Evidence from the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2018)New Entry Threats, Firm Governance, and Innovation in the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2015)Reducing Garbage Collection Overhead in SSD Based on Workload Prediction., , , , , , , , , and . HotStorage, USENIX Association, (2019)Kinematics Analysis of Leg Configuration of An Ostrich Bionic Biped Robot., , , and . RobCE, page 19-22. ACM, (2021)Anti-vibration design and research of four-wire type vortex flow meter., , , and . I2MTC, page 1-6. IEEE, (2018)Learning-Based Computer-Aided Prescription Model for Parkinson's Disease: A Data-Driven Perspective., , , , , , , and . IEEE J. Biomed. Health Informatics, 25 (9): 3258-3269 (2021)Origami-inspired soft twisting actuator., , , , , , , , , and 1 other author(s). CoRR, (2021)Metric-Entropy Limits on Nonlinear Dynamical System Learning., , and . CoRR, (2024)Side-Channel Attacks Based on Collaborative Learning., , , , and . ICPCSEE (1), volume 727 of Communications in Computer and Information Science, page 549-557. Springer, (2017)