Author of the publication

Secure Index Search for Groups.

, , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 128-140. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data., , , and . Secure Data Management, volume 4165 of Lecture Notes in Computer Science, page 75-83. Springer, (2006)Patterns of Designer-User Interactions in the Design Innovation Process., and . AMCIS, Association for Information Systems, (2014)Patterns of Designer-User Interactions in the Design Refinement Process., and . PACIS, page 114. (2014)Attribute-based Access Control using Combined Authentication Technologies., , and . GrC, page 518-523. IEEE, (2008)Virtualized Security Defense System for Blurred Boundaries of Next Generation Computing Era.. FSDM, volume 293 of Frontiers in Artificial Intelligence and Applications, page 208-219. IOS Press, (2016)Privacy-Aware Access Control through Negotiation in Daily Life Service., , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 514-519. Springer, (2008)PPIDS: Privacy Preserving Intrusion Detection System., , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 269-274. Springer, (2007)Secure Index Search for Groups., , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 128-140. Springer, (2005)Co-creation Patterns between Designers and Users in the Design Process: A View of Reflexivity., and . DESRIST, volume 8463 of Lecture Notes in Computer Science, page 32-53. Springer, (2014)SSS-V2: Secure Similarity Search.. IACR Cryptology ePrint Archive, (2013)