Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud., , , , and . IEEE Trans. Parallel Distributed Syst., 31 (11): 2668-2681 (2020)Efficient Two-Server Password-Only Authenticated Key Exchange., , and . IEEE Trans. Parallel Distributed Syst., 24 (9): 1773-1782 (2013)Two-Factor Decryption: A Better Way to Protect Data Security and Privacy., , , , and . Comput. J., 64 (4): 550-563 (2021)Range search on encrypted spatial data with dynamic updates., , , , , , , and . J. Comput. Secur., 30 (6): 829-849 (2022)Distributed Association Rule Mining with Minimum Communication Overhead., , and . AusDM, volume 101 of CRPIT, page 17-24. Australian Computer Society, (2009)Practical Remote End-to-End Voting Scheme., and . EGOVIS, volume 6866 of Lecture Notes in Computer Science, page 386-400. Springer, (2011)TimeClave: Oblivious In-Enclave Time Series Processing System., , , , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 719-737. Springer, (2023)Identity-based Password-Authenticated Key Exchange for Client/Server Model., , and . SECRYPT, page 45-54. SciTePress, (2012)OblivSketch: Oblivious Network Measurement as a Cloud Service., , , , , , and . NDSS, The Internet Society, (2021)Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption., , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 360-370. Springer, (2011)