| Publication | Date of Publication | Type |
|---|
| A practical forward-secure DualRing | 2024-06-05 | Paper |
M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption Information Security Practice and Experience | 2023-08-04 | Paper |
DSH: Deniable Secret Handshake Framework Information Security Practice and Experience | 2023-06-30 | Paper |
| Server-aided revocable attribute-based encryption | 2022-08-19 | Paper |
Server-aided revocable identity-based encryption Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
Efficient ciphertext-policy attribute-based encryption with blackbox traceability Information Sciences | 2021-11-23 | Paper |
| Privacy-preserving remote user authentication with \(k\)-times untraceability | 2019-10-31 | Paper |
| Efficient tag path authentication protocol with less tag memory | 2018-12-07 | Paper |
| Attribute-based encryption with expressive and authorized keyword search | 2017-08-25 | Paper |
Towards semantically secure outsourcing of association rule mining on categorical data Information Sciences | 2016-07-08 | Paper |
Statistical database auditing without query denial threat INFORMS Journal on Computing | 2015-09-11 | Paper |
Authorized keyword search on encrypted data Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2012-01-18 | Paper |
Fully secure cipertext-policy hiding CP-ABE Information Security Practice and Experience | 2011-05-19 | Paper |
Vulnerability analysis of RFID protocols for tag ownership transfer Computer Networks | 2010-11-25 | Paper |
Achieving high security and efficiency in RFID-tagged supply chains International Journal of Applied Cryptography | 2010-09-22 | Paper |
A new framework for RFID privacy Computer Security – ESORICS 2010 | 2010-09-20 | Paper |
Efficient discrete logarithm based multi-signature scheme in the plain public key model Designs, Codes and Cryptography | 2010-02-25 | Paper |
Self-enforcing private inference control Provable Security | 2009-12-11 | Paper |
Looking into the seeds of time: Discovering temporal patterns in large transaction sets Information Sciences | 2006-05-16 | Paper |
A fragile watermarking scheme for detecting malicious modifications of database relations Information Sciences | 2006-05-16 | Paper |
| scientific article; zbMATH DE number 2090937 (Why is no real title available?) | 2004-08-13 | Paper |
| scientific article; zbMATH DE number 2088770 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2080028 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 1718513 (Why is no real title available?) | 2002-03-12 | Paper |
Algorithm of data processing of ballistic range experiment Progress in Natural Science | 1998-01-01 | Paper |