Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudCryptoSearch: a prototype for secure searching of private data in cloud encrypted domains., and . OAIR, page 209-210. ACM, (2013)Searching private data in a cloud encrypted domain., and . OAIR, page 165-172. ACM, (2013)Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties., , , and . DPM/SETOP/QASA, volume 8872 of Lecture Notes in Computer Science, page 311-318. Springer, (2014)BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage., , , , , and . IACR Cryptol. ePrint Arch., (2018)TMS: a trusted mail repository service using public storage clouds., , and . MW4NextGen@Middleware, page 2:1-2:6. ACM, (2013)MuSE: Multimodal Searchable Encryption for Cloud Applications., , and . SRDS, page 181-190. IEEE Computer Society, (2018)Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1307-1319 (2022)Secure Conflict-free Replicated Data Types., , , , and . ICDCN, page 6-15. ACM, (2021)MuSE: Multimodal Searchable Encryption for Cloud Applications., , and . IACR Cryptol. ePrint Arch., (2017)Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , and . CCS, page 3399-3401. ACM, (2022)