Author of the publication

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.

, , , , , , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 91-110. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public-Key Cryptosystems with Primitive Power Roots of Unity., , and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 98-112. Springer, (2008)Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 214-234. Springer, (2017)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)Determination of Parameters Balancing between Security and Search Performance on Searchable Encryption., , , and . ICMU, page 1-8. IEEE, (2021)A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols., , , , , and . ISITA, page 315-319. IEEE, (2016)Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes., , , , , , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 91-110. Springer, (2016)Token-Based Multi-input Functional Encryption., , , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 147-164. Springer, (2018)SEPM: Efficient Partial Keyword Search on Encrypted Data., , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 75-91. Springer, (2015)DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems., , and . DSC, page 1-8. IEEE, (2021)On methods for privacy-preserving energy disaggregation., , , , , , and . ICASSP, page 6404-6408. IEEE, (2017)