Author of the publication

An Efficient Conjunctive Keyword Searchable Encryption Scheme for Mobile Cloud Computing.

, , , and . ICIC (2), volume 9772 of Lecture Notes in Computer Science, page 659-669. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding subqueries to MySQL, what does it take to have a decision-support engine?, , and . DOLAP, page 49-56. ACM, (2002)Toward accurate energy-efficient cellular network: switching off excessive carriers based on traffic profiling., , , and . SAC, page 546-551. ACM, (2016)SQL query optimization through nested relational algebra., and . ACM Trans. Database Syst., 32 (3): 18 (2007)Short text classification by detecting information path., , , , , and . CIKM, page 727-732. ACM, (2013)The Mahalanobis Distance Based Rival Penalized Competitive Learning Algorithm., and . ISNN (1), volume 3971 of Lecture Notes in Computer Science, page 442-447. Springer, (2006)Direction-aware KNN queries for moving objects in a road network., , , , and . World Wide Web, 22 (4): 1765-1797 (2019)An incentive-based workload assignment with power allocation in ad hoc cloud., , , and . ICC, page 1-6. IEEE, (2017)Compressed sensing enabled narrowband interference mitigation for IR-UWB systems., , , and . WCSP, page 1-5. IEEE, (2013)A conflict avoid method between Load Balancing and Mobility Robustness Optimization in LTE., , , and . ICCC, page 143-148. IEEE, (2012)Cooperative Spectrum Sharing with Energy-Save in Cognitive Radio Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2015)