Author of the publication

Private Query on Encrypted Data in Multi-user Settings.

, , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 71-85. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange., , and . IEICE Transactions, 88-B (4): 1641-1646 (2005)Speech enhancement using generalized weighted β-order spectral amplitude estimator., , and . Speech Communication, (2014)Blind Joint Symbol Detection and DOA Estimation for OFDM System with Antenna Array., , and . Wireless Personal Communications, 46 (3): 371-383 (2008)Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis., , , and . ICON, page 231-235. IEEE, (2011)Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation., , , , and . AINA Workshops (1), page 385-391. IEEE Computer Society, (2007)Efficient Proof of Validity of Votes in Homomorphic E-Voting., and . NSS, page 17-23. IEEE Computer Society, (2010)Comments on yet another log-in authentication using n-dimensional construction., , and . IEEE Trans. Consumer Electronics, 50 (2): 606-608 (2004)Codebook-based speech enhancement using Markov process and speech-presence probability., , and . INTERSPEECH, page 1780-1784. ISCA, (2015)A speech enhancement method by coupling speech detection and spectral amplitude estimation., , and . INTERSPEECH, page 3234-3238. ISCA, (2013)Speech enhancement based on a few shapes of speech spectrum., , , and . ChinaSIP, page 90-94. IEEE, (2014)