Search for persons
X
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
3
Public Key Encryption with Hierarchical Authorized Keyword ..:
, In:
?
2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW) ,
6
On the Identity Match Rate in Web Browsing History:
, In:
?
Advances in Information and Computer Security; Lecture Notes in Computer Science ,
7
Quantum-Resistant 1-out-of-N Oblivious Signatures from Latt..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
8