Author of the publication

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.

, , , , , and . IACR Cryptology ePrint Archive, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Medium optimization of antifungal metabolites produced by Bacillus globisporus A95 using response surface methodology., , , , , and . ICNC, page 384-388. IEEE, (2010)Reducing computational complexity using transmitter correlation value-assisted schedulers in multiuser MIMO uplink., , and . Wirel. Commun. Mob. Comput., 11 (9): 1266-1274 (2011)A Novel Method for Deformation Estimation Based on Multibaseline InSAR Phase Unwrapping., , , and . IEEE Trans. Geosci. Remote. Sens., 56 (9): 5231-5243 (2018)Design of Remote-Control Multi-view Monitor for Vehicle-Mounted Mobile Phone Based on IoT., , , , and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 719-728. Springer, (2020)Research on Application of Logistics Service Quality Management Based on Blockchain., , , and . ICA3PP (Workshops), volume 11338 of Lecture Notes in Computer Science, page 151-157. Springer, (2018)Design of V-Type Warehouse Layout and Picking Path Model Based on Internet of Things., , , , , and . IEEE Access, (2019)Hardware Design of a Kind of Grid Multi-Scroll Chaotic System Based on a MSP430F169 Chip., and . J. Circuits Syst. Comput., 29 (12): 2050189:1-2050189:18 (2020)Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (1): 222-233 (2014)Research on Cloud Computing Security Problems and Protection Countermeasures., , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 542-551. Springer, (2019)Network Attack Prediction Method Based on Threat Intelligence., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 151-160. Springer, (2018)