Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linking Differential Identifiability with Differential Privacy., , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 232-247. Springer, (2018)Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption.. J. Comput. Secur., 31 (6): 727-760 (2023)Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption., , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (2): 39-62 (2013)Optimal Distribution of Privacy Budget in Differential Privacy., , , , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 222-236. Springer, (2018)Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption.. IACR Cryptol. ePrint Arch., (2022)Privacy of Smart Traffic Lights Systems., , , , , and . VNC, page 17-24. IEEE, (2023)Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption.. DBSec, volume 13383 of Lecture Notes in Computer Science, page 197-214. Springer, (2022)Security Mechanisms Planning to Enforce Security Policies., , , and . FPS, volume 9482 of Lecture Notes in Computer Science, page 85-101. Springer, (2015)Confidentiality-Preserving Query Execution of Fragmented Outsourced Data., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 426-440. Springer, (2013)Specification and Deployment of Integrated Security Policies for Outsourced Data., , , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 17-32. Springer, (2014)