Author of the publication

SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition.

, , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 309-329. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext., , , , , and . AsiaCCS, page 201-210. ACM, (2016)REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT., , , , and . IEEE Trans. Dependable Secur. Comput., 21 (5): 4526-4542 (September 2024)Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing., , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)A Real-Time Aware Routing Strategy in Smart City Environments., , , , and . SECON Workshops, page 9-14. IEEE, (2018)Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks., , , , and . ICC, page 1-7. IEEE, (2020)Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience., , , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 112-132. Springer, (2018)Subversion-Resilient Public Key Encryption with Practical Watchdogs., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 627-658. Springer, (2021)Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved., , , , , and . CRYPTO (4), volume 12828 of Lecture Notes in Computer Science, page 270-300. Springer, (2021)A New General Framework for Secure Public Key Encryption with Keyword Search., , , , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 59-76. Springer, (2015)Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber., , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 111-129. Springer, (2023)