Author of the publication

Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.

, , , , and . GLOBECOM, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System identification of hammerstein models by using backward shift algorithm., and . Appl. Math. Comput., (2022)An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer., , , , and . IEEE Access, (2020)Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles., , , , and . Symmetry, 10 (5): 128 (2018)Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network., , , , and . ISNN (2), volume 6064 of Lecture Notes in Computer Science, page 556-565. Springer, (2010)A privacy-aware data dissemination scheme for smart grid with abnormal data traceability., , , and . Comput. Networks, (2017)A key management protocol with robust continuity for sensor networks., , , , and . Comput. Stand. Interfaces, 31 (4): 642-647 (2009)A new VRSA-based pairing-free certificateless signature scheme for fog computing., , , , and . Concurr. Comput. Pract. Exp., (2019)Traffic sign detection algorithm based on feature expression enhancement., , , , and . Multim. Tools Appl., 80 (25): 33593-33614 (2021)DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network., , , , and . IEEE Trans. Veh. Technol., 72 (4): 5152-5166 (April 2023)Towards Provable Security for Data Transmission Protocols in Sensor Network., , , and . J. Inf. Sci. Eng., 25 (1): 319-333 (2009)