Author of the publication

ICDM: An Encryption That Supports Unlimited Times Homomorphic Arithmetic Operations on Encrypted Data.

, , , , and . CSE, page 1220-1225. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Side-Channel Attacks Based on Collaborative Learning., , , , and . ICPCSEE (1), volume 727 of Communications in Computer and Information Science, page 549-557. Springer, (2017)Finite-Time Formation Control for Unmanned Aerial Vehicle Swarm System With Time-Delay and Input Saturation., , , and . IEEE Access, (2019)Development of 300-kV Air-Insulation Standard Impulse Measurement System., , , , , , and . IEEE Trans. Instrumentation and Measurement, 64 (6): 1627-1635 (2015)New Entry Threats, Firm Governance, and Innovation in the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2015)Anti-vibration design and research of four-wire type vortex flow meter., , , and . I2MTC, page 1-6. IEEE, (2018)Utilizing Fragmented Bandwidth in a Staggered Striping Multimedia System., and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)Reducing Garbage Collection Overhead in SSD Based on Workload Prediction., , , , , , , , , and . HotStorage, USENIX Association, (2019)New Entry Threats and Information Disclosure: Evidence from the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2018)Data Security and Privacy Protection for Cloud Storage: A Survey., , and . IEEE Access, (2020)A DCT-based privacy-preserving approach for efficient data mining., , , , , and . Secur. Commun. Networks, 8 (18): 3641-3652 (2015)