Author of the publication

Honey Encryption Beyond Message Recovery Security.

, , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 758-788. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compensation of Requantization and Interpolation Errors in MPEG-2 to H.264 Transcoding., , and . IEEE Trans. Circuits Syst. Video Techn., 18 (3): 314-325 (2008)Efficient Motion Re-Estimation With Rate-Distortion Optimization for MPEG-2 to H.264/AVC Transcoding., and . IEEE Trans. Circuits Syst. Video Techn., 20 (2): 262-274 (2010)Fast block size prediction for MPEG-2 to H.264/AVC transcoding., , and . ICASSP, page 1029-1032. IEEE, (2008)Making Public Key Functional Encryption Function Private, Distributively., and . Public Key Cryptography (2), volume 10770 of Lecture Notes in Computer Science, page 218-244. Springer, (2018)On the Security of Key Extraction From Measuring Physical Quantities., , , and . IEEE Trans. Inf. Forensics Secur., 11 (8): 1796-1806 (2016)Local and nonlocal constraints for compressed sensing video and multi-view image recovery., , , , and . Neurocomputing, (2020)Bit-rate estimation for bit-rate reduction H.264/AVC video transcoding in wireless networks., , , and . ISWPC, page 464-467. IEEE, (2008)Making Any Identity-Based Encryption Accountable, Efficiently., and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 326-346. Springer, (2015)Comments on a cryptographic key assignment scheme., and . Comput. Stand. Interfaces, 27 (3): 323-326 (2005)Enhancing the Retailer Gift Card via Blockchain: Trusted Resale and More., , and . J. Database Manag., 32 (1): 49-68 (2021)