Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction., , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 299-319. Springer, (2023)Group ID-Based Encryption with Equality Test., , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 39-57. Springer, (2019)dRMT: Disaggregated Programmable Switching., , , , , , , , , and 2 other author(s). SIGCOMM, page 1-14. ACM, (2017)Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage., , , , and . Comput. J., 67 (2): 642-657 (February 2024)EMG Biofeedback Based VR System for Hand Rotation and Grasping Rehabilitation., , , and . IV, page 479-484. IEEE Computer Society, (2010)ID-Based Encryption with Equality Test Against Insider Attack., , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 168-183. Springer, (2017)Plaintext-Verifiably-Checkable Encryption., , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 149-166. Springer, (2019)An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage., , and . Comput. Stand. Interfaces, (2025)Stand-Alone Unlicensed LTE (SAiL)., , , , , and . GLOBECOM, page 1-5. IEEE, (2016)A General Two-Server Cryptosystem Supporting Complex Queries., and . WISA, volume 10763 of Lecture Notes in Computer Science, page 249-260. Springer, (2017)