Author of the publication

Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database.

, , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (9): 9333-9349 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decomposition and Composition of Sequence Diagrams., , and . TASE, page 76-83. IEEE Computer Society, (2018)An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System., , , , , , and . IEEE Syst. J., 16 (4): 6569-6580 (2022)Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database., , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (9): 9333-9349 (September 2023)Isolation Modeling and Analysis Based on Mobility., , , , , , and . ACM Trans. Softw. Eng. Methodol., 28 (2): 10:1-10:31 (2019)Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2988-3001 (July 2023)PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 722-735 (2021)Accelerating Knuth-Morris-Pratt String Matching over LZ77 Compressed Text., , , , and . DCC, page 372. IEEE, (2021)TCNN: Two-Way Convolutional Neural Network for Image Steganalysis., , , , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 509-514. Springer, (2020)An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks., , , , and . IEEE Internet of Things Journal, 7 (4): 3462-3473 (2020)Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2805-2818 (2019)