Author of the publication

Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution Environment.

, , , , , and . CIKM, page 1345-1354. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on Model of Risk Assessment of Standard Operation in Rural Power Network., and . CCTA (3), volume 346 of IFIP Advances in Information and Communication Technology, page 440-444. Springer, (2010)Identifying Genetic Risk Factors via Sparse Group Lasso with Group Graph Structure., , , and . CoRR, (2017)PERCEPT Indoor Wayfinding for Blind and Visually Impaired Users: Navigation Instructions Algorithm and Validation Framework., , , and . ICT4AgeingWell, page 143-149. SCITEPRESS, (2017)Towards privacy-preserving RFID-based location-based services., , , , and . FSKD, page 2827-2831. IEEE, (2012)Continuous method for solving fixed point problem on square grid by cubic spline boundary.. CISP-BMEI, page 1-6. IEEE, (2017)Recovery of digital signals from chaotic switching.. I. J. Circuit Theory and Applications, 23 (6): 611-615 (1995)Sliding Mode Observer-Based Fault Detection of Distributed Networked Control Systems with Time Delay., , , , and . CSSP, 31 (1): 203-222 (2012)Study on agile supply chain management., , and . SMC (7), page 6031-6035. IEEE, (2004)Multichannel time delay estimation for acoustic source localization via robust adaptive blind system identification., , , and . IWAENC, page 1-5. IEEE, (2016)Continuously tracking and see-through occlusion based on a new hybrid synthetic aperture imaging model., , , , and . CVPR, page 3409-3416. IEEE Computer Society, (2011)