Author of the publication

Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.

, , , , , , and . IEEE Internet Things J., 9 (13): 11017-11029 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing., , , , , and . IEEE Internet Things J., 6 (2): 3003-3013 (2019)Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data., , , , , , and . IEEE Internet Things J., 6 (6): 9841-9852 (2019)PRICE: Privacy and Reliability-Aware Real-Time Incentive System for Crowdsensing., , , , , and . IEEE Internet Things J., 8 (24): 17584-17595 (2021)Fast and Secure Location-Based Services in Smart Cities on Outsourced Data., , , , , and . IEEE Internet Things J., 8 (24): 17639-17654 (2021)New Constructions for Identity-Based Unidirectional Proxy Re-Encryption., , , , and . J. Comput. Sci. Technol., 25 (4): 793-806 (2010)Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial Internet-of-Thing System., , , and . IEEE Trans. Ind. Informatics, 18 (4): 2807-2810 (2022)Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems., , and . Comput. Commun., 17 (4): 251-256 (1994)Secure access to outsourced data.. SCC@ASIACCS, page 1-2. ACM, (2013)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , and . ACM Conference on Computer and Communications Security, page 54-65. ACM, (2009)CrowdFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning., , , and . IEEE Trans. Mob. Comput., 22 (8): 4607-4619 (August 2023)