From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach., , , и . SIGMOD Conference, стр. 147-162. ACM, (2018)Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms., , и . TrustCom/BigDataSE, стр. 586-593. IEEE, (2019)New Empirical Traceability Analysis of CryptoNote-Style Blockchains., , , , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 133-149. Springer, (2019)PEREA: towards practical TTP-free revocation in anonymous authentication., , , и . ACM Conference on Computer and Communications Security, стр. 333-344. ACM, (2008)Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM., , , и . IEEE Trans. Intell. Transp. Syst., 24 (12): 14903-14913 (декабря 2023)Functional encryption for computational hiding in prime order groups via pair encodings., , , и . Des. Codes Cryptogr., 86 (1): 97-120 (2018)A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices., , , , и . IEEE Trans. Computers, 68 (10): 1411-1427 (2019)An efficient linkable group signature for payer tracing in anonymous cryptocurrencies., , , , , и . Future Gener. Comput. Syst., (2019)Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage., , и . Comput. J., 61 (12): 1806-1824 (2018)Stateful Switch: Optimized Time Series Release with Local Differential Privacy., , , , и . INFOCOM, стр. 1-10. IEEE, (2023)