Author of the publication

Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing.

, , , , , , and . IEEE Trans. Mob. Comput., 23 (5): 4181-4195 (May 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential conductance and spin current in hybrid quantum dot-topological superconducting nanowire., , and . Quantum Inf. Process., 20 (5): 177 (2021)移动低占空比无线传感网中数据收集的研究进展 (Research Progress on Data Collection in Mobile Low-duty-cycle Wireless Sensor Networks)., , , and . 计算机科学, 45 (4): 19-24 (2018)Research on Coupling Reliability Problem in Sensor-Cloud System., , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 468-478. Springer, (2017)Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things., , , , , and . IEEE Internet of Things Journal, 7 (4): 2679-2689 (2020)Rendezvous design algorithms for wireless sensor networks with a mobile base station., , , and . MobiHoc, page 231-240. ACM, (2008)Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks., , , , and . Ad Hoc Sens. Wirel. Networks, 16 (1-3): 191-138 (2012)Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment., , , and . IEEE Trans. Veh. Technol., 62 (1): 360-373 (2013)An incentive-based protection and recovery strategy for secure big data in social networks., , , , , and . Inf. Sci., (2020)Statistical classification of social networks., and . ICASSP, page 3977-3980. IEEE, (2012)The Clustering for Clients in a Bank Based on Big Data., , , , and . UV, page 1-5. IEEE, (2018)