Author of the publication

A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing.

, , and . Inf. Secur. J. A Glob. Perspect., 29 (6): 284-296 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Target Q-Coverage Problem with Bounded Service Delay in Directional Sensor Networks., , , , and . IJDSN, (2012)Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors., , , , and . ICCCN, page 1-8. IEEE, (2014)Minimum cost collaborative sensing network with mobile phones., , , , and . ICC, page 1816-1820. IEEE, (2013)Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks., , , , , and . Ad Hoc Networks, (2016)A Cooperative Localization Scheme for Zigbee-based Wireless Sensor Networks., and . ICON, page 1-5. IEEE, (2006)A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN., , and . Wirel. Commun. Mob. Comput., (2018)Unsupervised Localization by Learning Transition Model., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (2): 65:1-65:23 (2019)A Multi-Keywords Ranking Searchable Encryption Based on Similarity in Cloud Computing., , and . J. Inf. Hiding Multim. Signal Process., 9 (3): 669-679 (2018)Maximizing network lifetime using coverage sets scheduling in wireless sensor networks., , , , , and . Ad Hoc Networks, (2020)Firefly algorithm based on intelligent single particle learning., , , , and . Int. J. Comput. Sci. Math., 12 (4): 309-326 (2020)