Author of the publication

Utilizing fully homomorphic encryption to implement secure medical computation in smart cities.

, , , , and . Pers. Ubiquitous Comput., 21 (5): 831-839 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel Hash Function with Variable Initial Values., , and . Wireless Personal Communications, 96 (2): 2289-2303 (2017)Modeling on Guaranteed QoS for Wireless Sensor Networks: A Network Calculus Method, , and . CoRR, (2011)Transaction Remote Release (TRR): A New Anonymization Technology for Bitcoin., and . CoRR, (2015)A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication., , , and . Comput. Math. Methods Medicine, (2015)Optimizing security and quality of service in a Real-time database system using Multi-objective genetic algorithm., , , , , and . Expert Syst. Appl., (2016)Graph representation learning method based on three-way partial order structure., , , , , and . Int. J. Approx. Reason., (February 2024)Efficient Signature Schemes from R-LWE., , , and . KSII Trans. Internet Inf. Syst., 10 (8): 3911-3924 (2016)Efficient Chosen-Ciphertext Secure Encryption from R-LWE., , , , and . Wirel. Pers. Commun., 95 (3): 2973-2988 (2017)Hybrid Method for Solving New Pose Estimation Equation System., , , and . IWMM/GIAE, volume 3519 of Lecture Notes in Computer Science, page 44-55. Springer, (2004)A Novel Cloud-Based Fuzzy Self-Adaptive Ant Colony System., , , , and . ICNC (7), page 460-465. IEEE Computer Society, (2008)