Author of the publication

Constant bandwidth ORAM with small block size using PIR operations.

, , , , , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks., , , , and . J. Internet Serv. Inf. Secur., 4 (1): 25-36 (2014)A Distributed Anomaly Detection System for In-Vehicle Network Using HTM., , , , , and . IEEE Access, (2018)Unbalanced private set intersection cardinality protocol with low communication cost., , , , , , , , , and . Future Gener. Comput. Syst., (2020)Multi-authority fine-grained access control with accountability and its application in cloud., , , , , and . J. Netw. Comput. Appl., (2018)A Secure Architecture for Data Storage in the Cloud Environments., , , and . IMIS, page 289-291. IEEE Computer Society, (2015)A Survey on Consumer IoT Traffic: Security and Privacy., , , , , , and . CoRR, (2024)Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes., , , , , and . USENIX Security Symposium, page 1487-1504. USENIX Association, (2022)Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm., , , , , , and . AIS&P (1), volume 14509 of Lecture Notes in Computer Science, page 499-512. Springer, (2023)Generalized Format-Preserving Encryption for Character Data., , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 113-122. Springer, (2016)