Author of the publication

Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing.

, , , , , , and . IEEE Trans. Mob. Comput., 23 (5): 4181-4195 (May 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-View Adaptive Fusion Network for 3D Object Detection., , , , , and . CoRR, (2020)Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System., , , , and . CSE, page 58-65. IEEE, (2020)A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 560-569. Springer, (2005)A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks., , , , , and . TrustCom, page 413-419. IEEE, (2021)DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract., , and . TrustCom, page 1290-1295. IEEE, (2022)Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things., , , , , and . IEEE Internet of Things Journal, 7 (4): 2679-2689 (2020)Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition., , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 158-169. Springer, (2019)Authentication of Skyline Query over Road Networks., , , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 72-83. Springer, (2018)Borel probabilistic and quantitative logic., and . Sci. China Inf. Sci., 54 (9): 1843-1854 (2011)Superior Prosthetic Member Based on Assistive Technologies., , , , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 520-530. Springer, (2019)