Author of the publication

Semantic keyword search based on trie over encrypted cloud data.

, , , and . SCC@ASIACCS, page 59-62. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Writing in the Air with WiFi Signals for Virtual Reality Devices., , , , and . IEEE Trans. Mob. Comput., 18 (2): 473-484 (2019)Confusing-Keyword Based Secure Search over Encrypted Cloud Data., , , , and . Mob. Networks Appl., 25 (1): 125-132 (2020)New Forensic Methods for OOXML Format Documents., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 503-513. Springer, (2013)HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis., , , and . IEEE Signal Process. Lett., (2022)Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments., , , , , and . Wirel. Pers. Commun., 86 (3): 1467-1491 (2016)An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing., , , , , and . IEEE Access, (2016)WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU., , , , , , , and . Int. J. Parallel Program., 47 (4): 644-667 (2019)Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning., , and . ICIG (3), volume 12890 of Lecture Notes in Computer Science, page 155-167. Springer, (2021)Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud., , , , and . IJWGS, 14 (1): 21-43 (2018)Noise-level estimation based detection of motion-compensated frame interpolation in video sequences., , , , and . Multimedia Tools Appl., 77 (1): 663-688 (2018)