Author of the publication

MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.

, , , , and . IACR Cryptology ePrint Archive, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Di Liu University of Stuttgart

Data for: The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. Dataset, (2024)Related to: Di Liu, Florian Kaiser, Vladislav Bushmakin, Erik Hesselmeier, Timo Steidl, Takeshi Ohshima, Nguyen Tien Son, Jawad Ul-Hassan, Öney O. Soykal, Jörg Wrachtrup (2023). The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. arXiv preprint. arXiv: 2307.13648.
 

Other publications of authors with the same name

Cooperative attribute-based access control for enterprise computing system., , , , and . IJES, 7 (3/4): 191-202 (2015)Toward efficient and privacy-preserving computing in big data era., , , , and . IEEE Network, 28 (4): 46-50 (2014)Universal designated verifier transitive signatures for graph-based big data., , , , and . Inf. Sci., (2015)Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature., and . Int. J. Found. Comput. Sci., 17 (6): 1403-1422 (2006)Security Concerns in Popular Cloud Storage Services., , , , , and . IEEE Pervasive Computing, 12 (4): 50-57 (2013)Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption., , , , , , , and . J. UCS, 25 (3): 222-244 (2019)Two-Factor Data Security Protection Mechanism for Cloud Storage System., , , , and . IEEE Trans. Computers, 65 (6): 1992-2004 (2016)Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful., , and . CoRR, (2019)Towards secure and cost-effective fuzzy access control in mobile cloud computing., , , , and . Soft Comput., 21 (10): 2643-2649 (2017)Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption., , , and . Comput. J., 58 (10): 2778-2792 (2015)