Author of the publication

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.

, , , , , and . J. Internet Serv. Inf. Secur., 7 (2): 1-18 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel-Machine Scheduling with Step-Deteriorating Jobs to Minimize the Total (Weighted) Completion Time., , , , and . Asia Pac. J. Oper. Res., 40 (1): 2240011:1-2240011:13 (February 2023)New Forward-Secure Signature Scheme with Untrusted Update., , , , and . J. Inf. Sci. Eng., 27 (4): 1435-1448 (2011)A 3D object model for wireless camera networks with network constraints., and . ICDSC, page 1-8. IEEE, (2009)DietCam: Multiview Food Recognition Using a Multikernel SVM., , and . IEEE J. Biomed. Health Informatics, 20 (3): 848-855 (2016)One forward-secure signature scheme using bilinear maps and its applications., , , , and . Inf. Sci., (2014)Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps., , , , and . ProvSec, volume 5324 of Lecture Notes in Computer Science, page 83-97. Springer, (2008)Security Analysis of an RSA Key Generation Algorithm with a Large Private Key., , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 95-101. Springer, (2011)基于Space-P复杂网络模型的城市公交网络特性分析 (Characteristic Analysis of Urban Public Transport Networks Based on Space-P Complex Network Model)., , and . 计算机科学, 45 (8): 125-130 (2018)基于时空特征挖掘的交通流量预测方法 (Traffic Flow Prediction Method Based on Spatio-Temporal Feature Mining)., , and . 计算机科学, 46 (7): 322-326 (2019)A verifiable and privacy-preserving framework for federated recommendation system., , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (4): 4273-4287 (2023)