Author of the publication

Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based System.

, , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 206-217. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of Damper Winding and Stator Slot Skewing Structure on No-Load Voltage Waveform Distortion and Damper Bar Heat in Large Tubular Hydro Generator., , , , , , , and . IEEE Access, (2018)A coordinated dispatch method for energy storage power system considering wind power ramp event., , and . Appl. Soft Comput., (2019)Autonomic decentralized elasticity based on a reinforcement learning controller for cloud applications., , , , , and . Future Gener. Comput. Syst., (2019)Attention Based Speech Model for Japanese Recognization., , , , , and . SmartIoT, page 402-406. IEEE, (2019)Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach., , and . J. Comput. Inf. Syst., 53 (3): 65-74 (2013)流间编码与流内编码相结合的机会路由算法 (Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network)., and . 计算机科学, 45 (5): 69-74 (2018)Structure Descriptor for Articulated Shape Analysis., , and . ISVC (1), volume 8033 of Lecture Notes in Computer Science, page 171-180. Springer, (2013)Integrated electromicrobial conversion of CO2 to higher alcohols, , , , , , , , , and . Science, (2012)Robust Control for AC-Excited Hydrogenerator System Using Adaptive Fuzzy-Neural Network., , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 1039-1045. Springer, (2006)P-LEACH: An Efficient Cluster-Based Technique to Track Mobile Sinks in Wireless Sensor Networks., , , and . IJDSN, (2014)