Author of the publication

Efficient Dynamic Provable Possession of Remote Data via Update Trees.

, and . ACM Trans. Storage, 12 (2): 9:1-9:45 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PICCO: a general-purpose compiler for private distributed computation., , and . ACM Conference on Computer and Communications Security, page 813-826. ACM, (2013)Secure Outsourcing of DNA Searching via Finite Automata., and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 49-64. Springer, (2010)Deniable cloud storage: sharing files via public-key deniability., , and . WPES, page 31-42. ACM, (2010)On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting., and . SECRYPT, page 68-77. SciTePress, (2011)Biometric-Based Non-transferable Anonymous Credentials., and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 165-180. Springer, (2009)Efficient Dynamic Provable Possession of Remote Data via Update Trees., and . ACM Trans. Storage, 12 (2): 9:1-9:45 (2016)Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation., and . Proc. Priv. Enhancing Technol., 2016 (4): 144-164 (2016)Secure and Accurate Summation of Many Floating-Point Numbers., , and . CoRR, (2023)Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning., , and . IACR Cryptol. ePrint Arch., (2020)Succinct representation of flexible and privacy-preserving access rights., and . VLDB J., 15 (4): 334-354 (2006)