Author of the publication

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.

, , , and . IEEE Trans. Information Forensics and Security, 10 (12): 2643-2652 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme., , and . Wireless Personal Communications, 72 (1): 245-258 (2013)On RFID Authentication Protocols with Wide-Strong Privacy., , , , and . RFIDSec Asia, volume 11 of Cryptology and Information Security Series, page 3-16. IOS Press, (2013)Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update., , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 39-60. (2016)Oblivious Keyword Search with Authorization., , , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 173-190. (2016)Self-certified ring signatures., , , and . AsiaCCS, page 396-400. ACM, (2011)Generalized closest substring encryption., , and . Des. Codes Cryptogr., 80 (1): 103-124 (2016)Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters., , , , , , , and . Inf. Sci., (2019)Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext., , , , , and . AsiaCCS, page 201-210. ACM, (2016)Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage., , , , and . IEEE Trans. Information Forensics and Security, 11 (4): 789-798 (2016)Server-Aided Public Key Encryption With Keyword Search., , , , , , and . IEEE Trans. Information Forensics and Security, 11 (12): 2833-2842 (2016)