Author of the publication

Achieving Efficient Conjunctive Keyword Searches over Encrypted Data.

, , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 414-426. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tick Tock: Building Browser Red Pills from Timing Side Channels., , , and . WOOT, USENIX Association, (2014)CAMP: Content-Agnostic Malware Protection., , , , and . NDSS, The Internet Society, (2013)Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?, , , and . USENIX Security Symposium, USENIX Association, (2007)Forgery Quality and Its Implications for Behavioral Biometric Security., , and . IEEE Trans. Syst. Man Cybern. Part B, 37 (5): 1107-1118 (2007)Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations., , , , and . SP, page 35-49. IEEE Computer Society, (2008)The Practical Subtleties of Biometric Key Generation., , and . USENIX Security Symposium, page 61-74. USENIX Association, (2008)Correlation-Resistant Storage via Keyword-Searchable Encryption., , , and . IACR Cryptology ePrint Archive, (2005)Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension., , , , , , , and . WWW, page 1009-1019. ACM, (2016)Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing., , and . USENIX Security Symposium, USENIX Association, (2006)Achieving Efficient Conjunctive Keyword Searches over Encrypted Data., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 414-426. Springer, (2005)