Author of the publication

Secure searchable public key encryption scheme against keyword guessing attacks.

, , and . IEICE Electronic Express, 6 (5): 237-243 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised learning network based on gradient descent procedure of fuzzy objective function., and . ICNN, page 1427-1432. IEEE, (1996)Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption., , , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 16-34. Springer, (2002)Fully collusion-resistant trace-and-revoke scheme in prime-order groups., , and . Journal of Communications and Networks, 13 (5): 428-441 (2011)Oblivious Conjunctive Keyword Search., , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 318-327. Springer, (2005)A Design and Analysis of Objective Function-Based Unsupervised Neural Networks for Fuzzy Clustering., and . Neural Processing Letters, 4 (2): 83-95 (1996)Fingerprint-based access control using smart cards in IPTV., , , , and . Multimedia Tools Appl., 73 (2): 647-661 (2014)Secure searchable public key encryption scheme against keyword guessing attacks., , and . IEICE Electronic Express, 6 (5): 237-243 (2009)Keyword Updatable PEKS., and . WISA, volume 9503 of Lecture Notes in Computer Science, page 96-109. Springer, (2015)Trapdoor security in a searchable public-key encryption scheme with a designated tester., , , and . Journal of Systems and Software, 83 (5): 763-771 (2010)Improved searchable public key encryption with designated tester., , , and . AsiaCCS, page 376-379. ACM, (2009)