Author of the publication

Hiding Tree Structured Data and Queries from Untrusted Data Stores.

, and . Inf. Secur. J. A Glob. Perspect., 14 (4): 10-26 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The consumer loan default predicting model - An application of DEA-DA and neural network., , , and . Expert Syst. Appl., 36 (9): 11682-11690 (2009)An information-based score function of interval-valued intuitionistic fuzzy sets and its application in multiattribute decision making., , , and . Soft Comput., 25 (3): 1913-1923 (2021)The Novel Generalized Exponential Entropy for Intuitionistic Fuzzy Sets and Interval Valued Intuitionistic Fuzzy Sets., , , and . Int. J. Fuzzy Syst., 21 (8): 2327-2339 (2019)Regional Input-Output Multiple Choice Goal Programming Model and Method for Industry Structure Optimization on Energy Conservation and GHG Emission Reduction in China., , , , and . Int. J. Comput. Intell. Syst., 12 (2): 1311-1322 (2019)Hiding Traversal of Tree Structured Data from Untrusted Data Stores., and . WOSIS, page 314-323. INSTICC Press, (2004)A splitting moving mesh method for reaction-diffusion equations of quenching type., , , and . J. Comput. Phys., 215 (2): 757-777 (2006)The Local L2 Projected C0 Finite Element Method for Maxwell Problem., , , and . SIAM J. Numer. Anal., 47 (2): 1274-1303 (2009)A numerical method for quasilinear singular perturbation problems with turning points.. Computing, 46 (2): 155-164 (1991)FPODG: a flexible and private proximity testing based on 'one degree' grid., , , , and . Int. J. Sens. Networks, 20 (3): 199-207 (2016)Sequential Regularization Methods for Simulating Mechanical Systems with Many Closed Loops., and . SIAM J. Sci. Comput., 21 (4): 1244-1262 (1999)