Author of the publication

PAFR: Privacy-Aware Friends Retrieval over Online Social Networks.

, , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 323-338. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage"., , , and . IEEE Trans. Services Computing, 9 (6): 996-998 (2016)Integrity-verifiable conjunctive keyword searchable encryption in cloud storage., , , , and . Int. J. Inf. Sec., 17 (5): 549-568 (2018)Privacy-Preserving Subgraph Matching Protocol for Two Parties., , , , and . Int. J. Found. Comput. Sci., 30 (4): 571-588 (2019)Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas., , , , and . J. Network and Computer Applications, (2019)Private Graph Intersection Protocol., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 235-248. Springer, (2017)Identity-Based Batch Provable Data Possession., , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 112-129. (2016)Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing., , , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 153-172. (2016)Faster fog-aided private set intersectionwith integrity preserving., , , and . Frontiers of IT & EE, 19 (12): 1558-1568 (2018)Chameleon accumulator and its applications., , , , and . J. Inf. Secur. Appl., (2020)Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud., , , , and . Concurrency and Computation: Practice and Experience, 28 (11): 3238-3253 (2016)