Author of the publication

Private Subgraph Matching Protocol.

, , , , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 455-470. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Two-Server Ranked Dynamic Searchable Encryption Scheme., , , and . IEEE Access, (2020)An Approach to Integrated Scheduling of Flexible Job-Shop Considering Conflict-Free Routing Problems., , , , and . Sensors, 23 (9): 4526 (2023)Identity-Based Batch Provable Data Possession with Detailed Analyses., , , and . Int. J. Found. Comput. Sci., 28 (6): 743-760 (2017)Chameleon accumulator and its applications., , , , and . J. Inf. Secur. Appl., (2020)Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas., , , , and . J. Netw. Comput. Appl., (2019)Privacy-Preserving Graph Operations for Social Network Analysis., , , , and . SocialSec, volume 1298 of Communications in Computer and Information Science, page 303-317. Springer, (2020)Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing., , , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 153-172. (2016)Private Graph Intersection Protocol., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 235-248. Springer, (2017)Identity-Based Batch Provable Data Possession., , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 112-129. (2016)Faster fog-aided private set intersectionwith integrity preserving., , , and . Frontiers Inf. Technol. Electron. Eng., 19 (12): 1558-1568 (2018)