Author of the publication

Security Limitations of Using Secret Sharing for Data Outsourcing

, and . Data and Applications Security and Privacy XXVI, volume 7371 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2012)
DOI: 10.1007/978-3-642-31540-4_12

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Limitations of Using Secret Sharing for Data Outsourcing, and . Data and Applications Security and Privacy XXVI, volume 7371 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2012)Dynamic Merkle Trees for Verifying Privileges in Sensor Networks., and . ICC, page 2276-2282. IEEE, (2006)Distributed Center-Location Algorithms: Proposals and Comparisons., and . INFOCOM, page 75-84. IEEE Computer Society, (1996)Hierarchical policy delegation in multiple-authority ABE., and . Int. J. Inf. Comput. Secur., 7 (2/3/4): 140-159 (2015)An Algebraic Approach to Modeling in Software Engineering., and . AMAST, page 385-392. Springer, (1993)Designing an Agent Synthesis System for Cross-RPC Communication., and . IEEE Trans. Software Eng., 20 (3): 188-198 (1994)Spatial Hash-Joins., and . SIGMOD Conference, page 247-258. ACM Press, (1996)Combining ORAM with PIR to Minimize Bandwidth Costs., and . CODASPY, page 289-296. ACM, (2015)Efficient key establishment for group-based wireless sensor deployments., , and . Workshop on Wireless Security, page 1-10. ACM, (2005)Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks., , and . SecureComm, page 397-399. IEEE, (2005)