Author of the publication

Efficiently computing reverse k furthest neighbors.

, , , , and . ICDE, page 1110-1121. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography., , , and . ICMR, page 53-57. ACM, (2019)User Authentication for Online Applications Using a USB-Based Trust Device., , , and . MobiSec, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 15-26. Springer, (2010)Normalizing Traffic Pattern with Anonymity for Mission Critical Applications., , and . Annual Simulation Symposium, page 293-299. IEEE Computer Society, (2004)Cloud#: A Specification Language for Modeling Cloud., and . IEEE CLOUD, page 533-540. IEEE Computer Society, (2011)Efficient Processing of Encrypted Data in Honest-but-Curious Clouds.. CLOUD, page 970-974. IEEE Computer Society, (2016)Query encrypted databases practically., and . CCS, page 1049-1051. ACM, (2012)Programmable Order-Preserving Secure Index for Encrypted Database Query., and . IEEE CLOUD, page 502-509. IEEE Computer Society, (2012)Semantic Weaving for Context-Aware Web Service Composition., , and . WISE, volume 5802 of Lecture Notes in Computer Science, page 101-114. Springer, (2009)Designing Smart Contract for Electronic Document Taxation., , , , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 199-213. Springer, (2019)Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual., , , , , and . AsiaCCS, page 859-871. ACM, (2021)