Author of the publication

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.

, , , and . Comput. J., 62 (4): 545-562 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delaunay Triangles Model for Image-Based Motion Retargeting., and . DEFORM/AVATARS, volume 196 of IFIP Conference Proceedings, page 158-168. Kluwer, (2000)Privacy-preserving disjunctive normal form operations on distributed sets., , , and . Inf. Sci., (2013)A Privacy-Strengthened Scheme for E-Healthcare Monitoring System., , and . J. Medical Systems, 36 (5): 2959-2971 (2012)A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme., and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 101-115. Springer, (2008)Anonymity Control in Multi-bank E-Cash System., and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 104-116. Springer, (2000)Resistance of S-Boxes against Algebraic Attacks., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model., , and . IEEE Access, (2019)A Practical Inter-sensor Broadcast Authentication Scheme., , , and . HCI (5), volume 4554 of Lecture Notes in Computer Science, page 399-405. Springer, (2007)Efficient Password-Based Group Key Exchange., , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 191-199. Springer, (2004)GA based Adaptive Sampling for Image-based Walkthrough., , and . EGVE, page 135-142. Eurographics Association, (2006)