Author of the publication

Privacy-Preserving Range Queries from Keyword Queries.

, and . DBSec, volume 9149 of Lecture Notes in Computer Science, page 35-50. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Last hop topology sensitive multicasting key managment., and . Q2SWinet, page 63-70. ACM, (2005)Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)Integrated network experimentation for QoS measurements in opaque MANETs., , , and . Int. J. Netw. Manag., 20 (4): 199-218 (2010)Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit., , , , , , and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 505-510. Springer, (1999)Predicting End-to-end Network Load., , , , and . ICMLA, page 917-920. IEEE Computer Society, (2010)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)Hybrid testbeds for QoS management in opaque MANETS., , , and . WICON, page 72. ICST, (2008)An Approach to Secure Localization in WLANs., , and . WCNC, page 3145-3150. IEEE, (2008)Computing with time: microarchitectural weird machines., , , , , and . ASPLOS, page 758-772. ACM, (2021)Service portability of networked appliances., , , and . IEEE Commun. Mag., 40 (1): 116-121 (2002)