Author of the publication

Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique.

, , , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 85-97. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially private Naive Bayes learning over multiple data sources., , , , and . Inf. Sci., (2018)Enabling efficient and secure data sharing in cloud computing., , , and . Concurr. Comput. Pract. Exp., 26 (5): 1052-1066 (2014)Generalized Format-Preserving Encryption for Character Data., , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 113-122. Springer, (2016)DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption., , , , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 216-226. Springer, (2016)Cycle-walking revisited: consistency, security, and efficiency., , , and . Secur. Commun. Networks, 6 (8): 985-992 (2013)Secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 Applications., , , , , and . IEEE Trans. Ind. Informatics, 18 (9): 6340-6348 (2022)QoS-Aware Diversified Service Selection., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2085-2099 (May 2023)FSSE: Forward secure searchable encryption with keyed-block chains., , , , , and . Inf. Sci., (2019)Reinforcement Learning Based Advertising Strategy Using Crowdsensing Vehicular Data., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4635-4647 (2021)An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm., , and . Int. J. Inf. Comput. Secur., 12 (4): 397-415 (2020)