Author of the publication

A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation.

, , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 403-430. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schema Conversion Methods between XML and Relational Models., , and . Knowledge Transformation for the Semantic Web, volume 95 of Frontiers in Artificial Intelligence and Applications, IOS Press, (2003)Open Innovation in the High-Tech Firms: Evidence from the Biotechnology Industry., and . ICIS, page 53. Association for Information Systems, (2007)Are your citations clean?, , , , and . Commun. ACM, 50 (12): 33--38 (December 2007)Conjunctive Point Predicate-based Semantic Caching for Wrappers in Web Databases., and . Workshop on Web Information and Data Management, page 45-48. ACM, (1998)FakeNewsNet: A Data Repository with News Content, Social Context and Dynamic Information for Studying Fake News on Social Media., , , , and . CoRR, (2018)Utility-based association rule mining: A marketing solution for cross-selling., , and . Expert Syst. Appl., 40 (7): 2715-2725 (2013)Characterizing Man-made vs. Machine-made Chatbot Dialogs., , , , and . TTO, (2019)ChamberBreaker: Mitigating the Echo Chamber Effect and Supporting Information Hygiene through a Gamified Inoculation System., , , , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW2): 472:1-472:26 (2021)Guest Editorial on Social Computing, Behavioral-Cultural Modeling and Prediction., , , and . IEEE Trans. Comput. Soc. Syst., 3 (2): 43-45 (2016)Do Language Models Plagiarize?, , , and . CoRR, (2022)