From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , и . Hum. centric Comput. Inf. Sci., (2015)Verifiable Structured Encryption., и . Inscrypt, том 7763 из Lecture Notes in Computer Science, стр. 137-156. Springer, (2012)An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption., и . IWDW, том 5450 из Lecture Notes in Computer Science, стр. 433-447. Springer, (2008)Delay, throughput and packet absorption rate analysis of heterogeneous WMN., , , , и . ICWCA, стр. 1-6. IEEE, (2012)Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution., , , , , , и . SIN, стр. 170. ACM, (2014)Analysis of a secure cooperative channel sensing protocol for cognitive radio networks., , и . SIN, стр. 41-46. ACM, (2012)Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks., и . ICONIP (1), том 9947 из Lecture Notes in Computer Science, стр. 555-562. (2016)Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud., , , , , и . IEEE Trans. Dependable Secur. Comput., 18 (3): 1307-1319 (2021)LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset., , , , , , и . CCS, стр. 2307-2320. ACM, (2021)On the security advantages of block-based multiserver searchable symmetric encryption., , и . PST, стр. 349-352. IEEE, (2016)