Search for persons
X
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
3
General Constructions of Fuzzy Extractors for Continuous So..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
5
Secure Sketch and Fuzzy Extractor with Imperfect Randomness..:
, In:
?
2022 IEEE International Performance, Computing, and Communications Conference (IPCCC) ,
6
Privacy-Preserving Closest Point Determination Based on Cip..:
, In:
?
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
7
BSA: Enabling Biometric-Based Storage and Authorization on ..:
, In:
?
2021 IEEE International Performance, Computing, and Communications Conference (IPCCC) ,
8
Three-Party Integer Comparison and Applications:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
13
Using Equivalent Class to Solve Interval Discrete Logarithm..:
, In:
?
Proceedings of the ACM Turing Celebration Conference - China ,
15