Author of the publication

Multi-client Secure Encrypted Search Using Searching Adversarial Networks.

, , , , and . IACR Cryptology ePrint Archive, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Sequential Aggregate Signature from RSA., , , and . ChinaGrid, page 123-127. IEEE Computer Society, (2009)A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 516-528. Springer, (2017)Forward Private Searchable Encryption with Conjunctive Keywords Query., , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 308-322. Springer, (2019)Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy., , , and . QSHINE, volume 402 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 323-339. Springer, (2021)Cyclic codes over R = Fp + uFp ++ uk-1Fp with length psn., , , , and . Inf. Sci., 181 (4): 926-934 (2011)Key Substitution Attacks on Multisignature Schemes., , , and . IEICE Transactions, 96-A (1): 244-245 (2013)Multi-client Secure Encrypted Search Using Searching Adversarial Networks., , , , and . IACR Cryptology ePrint Archive, (2019)Interpretable Encrypted Searchable Neural Networks., , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 279-289. Springer, (2019)Formal Description for an Object-Oriented Role-based Access Control Model., and . Computer and Information Science, 2 (2): 68-72 (2009)Reverse Iterative Image Encryption Scheme Using 8-layer Cellular Automata., , and . TIIS, 10 (7): 3397-3413 (2016)