Author of the publication

Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach.

, , , , , and . ACM Trans. Internet Techn., 21 (1): 12:1-12:17 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust stochastic block model., , , , and . Neurocomputing, (2020)Real-time 3D-Lidar, MMW Radar and GPS/IMU fusion based vehicle detection and tracking in unstructured environment., , , , and . ICRA, page 13339-13345. IEEE, (2021)DNEA: Dynamic Network Embedding Method for Anomaly Detection., , , and . KSEM, volume 12817 of Lecture Notes in Computer Science, page 236-248. Springer, (2021)Face Recognition Based on WT, FastICA and RBF Neural Network., , and . ICNC (2), page 3-7. IEEE Computer Society, (2007)3D-Lidar Based Negative Obstacle Detection in Unstructured Environment., , , , , and . ICVISP, page 45:1-45:6. ACM, (2020)A Block-based Generative Model for Attributed Networks Embedding., , , , and . CoRR, (2020)Lightweight multi-departmental data sharing scheme based on consortium blockchain., , , , and . Peer Peer Netw. Appl., 16 (5): 2399-2414 (September 2023)An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments., , , , and . Peer-to-Peer Netw. Appl., 14 (6): 3488-3501 (2021)Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach., , , , , and . ACM Trans. Internet Techn., 21 (1): 12:1-12:17 (2021)Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks., , and . Mob. Inf. Syst., (2020)