Author of the publication

General Constructions of Fuzzy Extractors for Continuous Sources.

, , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 163-182. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes., , , and . ICDCS Workshops, page 238-245. IEEE Computer Society, (2017)A similarity evaluation algorithm and its application in multi-keyword search on encrypted cloud data., , , and . MILCOM, page 1218-1223. IEEE, (2015)General Constructions of Fuzzy Extractors for Continuous Sources., , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 163-182. Springer, (2023)A hierarchical clustering method for big data oriented ciphertext search., , , and . INFOCOM Workshops, page 559-564. IEEE, (2014)A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data., , , , and . MONAMI, volume 235 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 66-78. Springer, (2017)Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)A Secure and Practical Sample-then-lock Scheme for Iris Recognition., , , , and . ICPR, page 833-839. IEEE, (2022)Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption., , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 128-146. Springer, (2017)Verify a Valid Message in Single Tuple: A Watermarking Technique for Relational Database., , , and . DASFAA (1), volume 12112 of Lecture Notes in Computer Science, page 54-71. Springer, (2020)A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait., , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 259-272. Springer, (2019)