Author of the publication

Executing Boolean Queries on an Encrypted Bitmap Index

, , , and . Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW \textquotesingle16, ACM Press, (2016)
DOI: 10.1145/2996429.2996436

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Secure Multi-tenant Virtualized Networks., and . TrustCom/BigDataSE/ISPA (1), page 1180-1185. IEEE, (2015)Providing User Security Guarantees in Public Infrastructure Clouds., , and . IEEE Trans. Cloud Computing, 5 (3): 405-419 (2017)Threats to 5G Group-based Authentication., and . SECRYPT, page 360-367. SciTePress, (2016)Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds., , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 279-296. Springer, (2013)Security aspects of e-Health systems migration to the cloud., , and . Healthcom, page 212-218. IEEE, (2014)SMACK: Short message authentication check against battery exhaustion in the Internet of Things., , and . SECON, page 274-282. IEEE, (2015)Trusted Launch of Virtual Machine Instances in Public IaaS Environments., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 309-323. Springer, (2012)Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System., , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 37-54. Springer, (2014)Prototyping intrusion detection in an industrial cloud-native digital twin., , , and . ICIT, page 749-755. IEEE, (2021)CLI-DOS: Collaborative Counteraction against Denial of Service in the Internet of Things., and . PerCom Workshops, page 1-6. IEEE, (2020)