Author of the publication

Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.

, , , , , , and . Sci. China Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FSSE: Forward secure searchable encryption with keyed-block chains., , , , , and . Inf. Sci., (2019)Searchable Symmetric Encryption with Forward Search Privacy., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 460-474 (2021)EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1579-1591 (2022)Frequency-Hiding Order-Preserving Encryption with Small Client Storage., , , , , , and . Proc. VLDB Endow., 14 (13): 3295-3307 (2021)M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices., , , , , and . IEEE Access, (2018)Unbalanced private set intersection cardinality protocol with low communication cost., , , , , , , , , and . Future Gener. Comput. Syst., (2020)FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance., , , , , and . IACR Cryptology ePrint Archive, (2017)Total variation distance privacy: Accurately measuring inference attacks and improving utility., , , , , , and . Inf. Sci., (May 2023)Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX., , , , , , and . Sci. China Inf. Sci., (2021)Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique., , , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 85-97. Springer, (2018)