Author of the publication

Executing Boolean Queries on an Encrypted Bitmap Index

, , , and . Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW \textquotesingle16, ACM Press, (2016)
DOI: 10.1145/2996429.2996436

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases., , and . IACR Cryptology ePrint Archive, (2017)Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers.. ICISC, volume 7839 of Lecture Notes in Computer Science, page 368-382. Springer, (2012)Executing Boolean Queries on an Encrypted Bitmap Index., , , and . CCSW, page 11-22. ACM, (2016)IoT Protection through Device to Cloud Synchronization., and . CloudCom, page 527-532. IEEE Computer Society, (2016)Executing Boolean Queries on an Encrypted Bitmap Index, , , and . Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW \textquotesingle16, ACM Press, (2016)Searchable Encrypted Relational Databases: Risks and Countermeasures., , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 70-85. Springer, (2017)Cryptanalysis of reduced QTL block cipher., , and . Microprocess. Microsystems, (2017)Blockchain and IoT: Mind the Gap., , and . InterIoT/SaSeIoT, volume 242 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 113-122. Springer, (2017)Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48., , , , , and . INDOCRYPT, volume 9462 of Lecture Notes in Computer Science, page 153-179. Springer, (2015)