Author of the publication

Multi-Client Cloud-Based Symmetric Searchable Encryption.

, , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2419-2437 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption)., , and . IACR Cryptology ePrint Archive, (2011)COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers., , and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 284-303. Springer, (2020)Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices., , , , , , , , and . IACR Cryptology ePrint Archive, (2020)Cryptanalysis of LASH., , , , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 207-223. Springer, (2008)Practical attack on NLM-MAC scheme., , and . Inf. Process. Lett., 114 (10): 547-550 (2014)Risk of Asynchronous Protocol Update: Attacks to Monero Protocols., , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 307-321. Springer, (2019)Fast and private multi-dimensional range search over encrypted data., , , , , and . Inf. Sci., (January 2024)Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol., , , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 235-246. Springer, (2019)Security for Signcryption: The Multi-User Model., and . Practical Signcryption, Springer, (2010)Multi-Client Cloud-Based Symmetric Searchable Encryption., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2419-2437 (2021)