Author of the publication

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.

, , , , and . INFOCOM, page 2389-2397. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The communication complexity of the Hamming distance problem., , , and . Inf. Process. Lett., 99 (4): 149-153 (2006)Tight Bounds for Randomized and Quantum Local Search.. SIAM J. Comput., 39 (3): 948-977 (2009)Efficient quantum protocols for XOR functions.. SODA, page 1878-1885. SIAM, (2014)Fast Relative-Error Approximation Algorithm for Ridge Regression., , , , and . UAI, page 201-210. AUAI Press, (2015)Fractional Fourier domain communication system: System structure and signal modeling., , and . CHINACOM, page 560-564. IEEE Computer Society, (2011)Efficient Protocols for Generating Bipartite Classical Distributions and Quantum States., , , and . IEEE Trans. Information Theory, 59 (8): 5171-5178 (2013)On the Tightness of the Buhrman-Cleve-Wigderson Simulation.. ISAAC, volume 5878 of Lecture Notes in Computer Science, page 434-440. Springer, (2009)Tight Bounds on Communication Complexity of Symmetric XOR Functions in One-Way and SMP Models., , and . TAMC, volume 6648 of Lecture Notes in Computer Science, page 403-408. Springer, (2011)Cost-effective fiber fault monitoring using MLMW-OOCs in high-capacity PONs considering user geographical distribution., , , and . Computer Communications, (2019)On the Power of a Unique Quantum Witness., , , , , and . Theory of Computing, 8 (1): 375-400 (2012)