Author of the publication

When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.

, , , and . DSN, page 543-554. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure access to outsourced data.. SCC@ASIACCS, page 1-2. ACM, (2013)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , and . ACM Conference on Computer and Communications Security, page 54-65. ACM, (2009)Privacy-Preserving Outsourced Calculation on Floating Point Numbers., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (11): 2513-2527 (2016)A type I hybrid ARQ system with adaptive code rates., and . IEEE Trans. Commun., 43 (2/3/4): 733-737 (1995)A Practical Password-Based Two-Server Authentication and Key Exchange System., , and . IEEE Trans. Dependable Secur. Comput., 3 (2): 105-114 (2006)Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management., , and . Int. J. Inf. Sec., 17 (3): 347-363 (2018)Multiuser private queries over encrypted databases., , , and . Int. J. Appl. Cryptogr., 1 (4): 309-319 (2009)CrowdFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning., , , and . IEEE Trans. Mob. Comput., 22 (8): 4607-4619 (August 2023)Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data., , , , , , and . IEEE Internet Things J., 6 (6): 9841-9852 (2019)Lattice-Based Remote User Authentication from Reusable Fuzzy Signature., , , , and . IACR Cryptology ePrint Archive, (2019)