Author of the publication

PriMal: Cloud-Based Privacy-Preserving Malware Detection.

, , , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 153-172. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication., , , and . IEEE Trans. Information Forensics and Security, 10 (12): 2643-2652 (2015)PriMal: Cloud-Based Privacy-Preserving Malware Detection., , , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 153-172. Springer, (2017)One-Round Strong Oblivious Signature-Based Envelope., , , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 3-20. Springer, (2016)Privacy-preserving data search and sharing protocol for social networks through wireless applications., , and . Concurrency and Computation: Practice and Experience, (2017)An efficient privacy-preserving aggregation and billing protocol for smart grid., , and . Security and Communication Networks, 9 (17): 4536-4547 (2016)One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications., , and . IEEE Trans. Information Forensics and Security, 11 (8): 1712-1721 (2016)Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties., , , , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 431-451. Springer, (2018)Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data., , , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 361-377. Springer, (2019)Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample., , , , , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 517-547. Springer, (2017)Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data., , , , , , and . IEEE Internet of Things Journal, 6 (6): 9841-9852 (2019)