Author of the publication

Generic Multi-keyword Ranked Search on Encrypted Cloud Data.

, , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 322-343. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Smart Contract for Electronic Document Taxation., , , , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 199-213. Springer, (2019)An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries., , , , and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 154-172. Springer, (2016)Blockchain-based Solutions for Education Credentialing System: Comparison and Implications for Future Development., , , and . Blockchain, page 79-86. IEEE, (2022)A Separable Threshold Ring Signature Scheme., , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 12-26. Springer, (2003)Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption., , , , , , and . CCS, page 763-780. ACM, (2018)RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 456-474. Springer, (2017)Sanitizable Signatures Revisited., , , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 80-97. Springer, (2008)Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List., , , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 516-534. Springer, (2018)Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 130-147. Springer, (2014)Practical Escrow Protocol for Bitcoin., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)