Author of the publication

Keyword search protocol with privacy preservation using ID-based proxy reencryption.

, , , , and . Int. J. Secur. Networks, 11 (4): 188-195 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT., , , and . IPCCC, page 1-7. IEEE, (2019)Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks., , and . J. Supercomput., 71 (11): 4015-4018 (2015)Utility-efficient Differentially Private K-means Clustering based on Cluster Merging., , , , and . CoRR, (2020)Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain., , , , and . CoRR, (2020)Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts., , , and . IEEE Internet Things J., 5 (5): 3580-3593 (2018)Toward Trusted and Secure Communication Among Multiple Internal Modules in CAV., , , , and . IEEE Internet Things J., 8 (24): 17734-17746 (2021)Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication., , , and . IEEE Internet Things J., 8 (1): 144-155 (2021)A novel anonymous authentication scheme without cryptography., , and . Trans. Emerg. Telecommun. Technol., 25 (9): 875-880 (2014)Probabilistic matrix factorization with personalized differential privacy., , , and . Knowl. Based Syst., (2019)基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption)., , , and . 计算机科学, 43 (1): 181-185 (2016)