Author of the publication

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bridging light-cone and NRQCD approaches: asymptotic behavior of \$B\_c\$ electromagnetic form factor, , and . (Aug 31, 2011)Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks., , , , and . J. Netw. Comput. Appl., (2016)Analyzing enterprise information system's feature use: a data-driven perspective., , and . Inf. Technol. People, 34 (1): 375-398 (2021)Synchronized Provable Data Possession Based on Blockchain for Digital Twin., , , and . IEEE Trans. Inf. Forensics Secur., (2022)Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data., , , , and . Future Gener. Comput. Syst., (2022)Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance., , , , , and . Comput. Secur., (2022)Adaptive Compaction Construction Simulation Based on Bayesian Field Theory., , , , , and . Sensors, 20 (18): 5178 (2020)EPDL: An efficient and privacy-preserving deep learning for crowdsensing., , , , and . Peer-to-Peer Netw. Appl., 15 (6): 2529-2541 (2022)The Conditional Reliability Evaluation of Data Center Network BCDC., , , , , and . Comput. J., 64 (9): 1451-1464 (2021)Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems., , , and . J. Syst. Archit., (September 2023)