Author of the publication

Keyword search protocol with privacy preservation using ID-based proxy reencryption.

, , , , and . Int. J. Secur. Networks, 11 (4): 188-195 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structural DNA Nanotechnology: Molecular Construction and Computation., , , , , , , , , and 15 other author(s). UC, volume 3699 of Lecture Notes in Computer Science, page 20-31. Springer, (2005)DDoS detection and defense mechanism based on cognitive-inspired computing in SDN., , , and . Future Gener. Comput. Syst., (2019)Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time"., , and . Future Gener. Comput. Syst., (2018)RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers., , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 330-344. Springer, (2019)MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs., , , , and . ICPADS, page 470-479. IEEE, (2019)PATH: privacy-preserving auction for heterogeneous spectrum allocations., , , , and . Wireless Networks, 25 (4): 1763-1776 (2019)A novel privacy-preserving speech recognition framework using bidirectional LSTM., , , , and . J. Cloud Comput., (2020)HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT., , , and . IPCCC, page 1-7. IEEE, (2019)Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain., , , , and . CoRR, (2020)Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks., , and . J. Supercomput., 71 (11): 4015-4018 (2015)