Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption., , , , , and . ACM Trans. Priv. Secur., 21 (4): 17:1-17:30 (2018)Visualization Techniques for Outlier Data., , and . ICAIIC, page 346-351. IEEE, (2020)A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology., , , , , and . J. Supercomput., 66 (2): 918-935 (2013)Downgrading Backward Privacy of Searchable Encryption., , , , and . ICOIN, page 324-328. IEEE, (2022)Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing., and . Future Gener. Comput. Syst., (2018)Secure proof of storage with deduplication for cloud storage systems., , , and . Multim. Tools Appl., 76 (19): 19363-19378 (2017)Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption., , , , , and . IEEE Access, (2023)An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability., , , and . ICWS, page 840-843. IEEE, (2017)Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services., , , and . IEEE CLOUD, page 392-400. IEEE Computer Society, (2018)Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage., , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 229-235. Springer, (2014)