Author of the publication

Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage.

, , , , and . Trustcom/BigDataSE/ISPA, page 623-629. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Half-sweep RSOR iteration with three-point linear rational finite difference scheme for solving first-order Fredholm integro-differential equations., , and . Int. J. Comput. Sci. Math., 17 (2): 182-194 (2023)Impact of Limited Feedback on Multiple Relay Zero-Forcing Precoding Systems., , and . ICC, page 4992-4997. IEEE, (2008)A Semantic Sequential Correlation Based LSTM Model for Next POI Recommendation., , , , , and . MDM, page 128-137. IEEE, (2019)MASS: Multiple ASSociation Scheme in IEEE 802.11 Wireless Mesh Networks., , , and . WICON, volume 98 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 204-215. Springer, (2011)A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement., , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 588-604. Springer, (2018)A new and effective hierarchical overlay structure for Peer-to-Peer networks., , and . Comput. Commun., 34 (7): 862-874 (2011)Evapotranspiration models compared on a Sierra Nevada forest ecosystem., , , , and . Environ. Model. Softw., 20 (6): 783-796 (2005)Towards Two Hops Opportunistic Relaying with the Estimation of Residual Expected Delay., , , , , and . Ad Hoc Sens. Wirel. Networks, 20 (1-2): 107-131 (2014)Charged-Spacecraft Formation: Concept, Deployment and Coulomb-Force Control., and . IEEE Access, (2020)DTN中基于时空和社会性的概率路由算法 (Probability Routing Algorithm in DTN Based on Time and Space and Sociality)., , and . 计算机科学, 43 (Z6): 295-300 (2016)