Author of the publication

Bucket Index Ordering Problem in Range Queries.

, , , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 347-355. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiparty Key Agreement Using Bilinear Map., , , and . IACR Cryptology ePrint Archive, (2007)Efficient Broadcast Encryption Using Multiple Interpolation Methods., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 87-103. Springer, (2004)Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function., , and . IEICE Trans. Commun., 98-B (7): 1276-1283 (2015)On the Linear Transformation in White-Box Cryptography., , and . IEEE Access, (2020)Data Randomization for Lightweight Secure Data Aggregation in Sensor Network., , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 338-351. Springer, (2008)New broadcast encryption scheme using tree-based circle., , , and . Digital Rights Management Workshop, page 37-44. ACM, (2005)Bucket Index Ordering Problem in Range Queries., , , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 347-355. Springer, (2014)Symmetric searchable encryption with efficient range query using multi-layered linked chains., , , and . J. Supercomput., 72 (11): 4233-4246 (2016)Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption., and . KSII Trans. Internet Inf. Syst., 14 (3): 1249-1262 (2020)Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency., , , and . IEICE Trans. Inf. Syst., 93-D (2): 315-325 (2010)