Author of the publication

Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme.

, , , , and . IEEE Trans. Cybern., 53 (6): 3588-3598 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data., , , , and . NPC, volume 11783 of Lecture Notes in Computer Science, page 169-181. Springer, (2019)An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data., , , , and . IEEE Access, (2019)Inverse mode problems for the finite element model of a vibrating rod., and . Appl. Math. Comput., 214 (2): 479-486 (2009)On the construction of a real symmetric five-diagonal matrix from its three eigenpairs., and . Appl. Math. Comput., 175 (1): 597-608 (2006)基于安全比较码的云环境隐私保护排序方法 (Secure Comparator Based Privacy-preserving Sorting Algorithms for Clouds)., , and . 计算机科学, 45 (5): 139-142 (2018)FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data., , , , and . IEEE Access, (2020)A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds., , , , and . IEEE Access, (2020)Network threat detection based on correlation analysis of multi-platform multi-source alert data., , , , , and . Multim. Tools Appl., 79 (45-46): 33349-33363 (2020)Stability analysis of time-delay systems using a contour integral method., and . Appl. Math. Comput., (2016)Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks., , , and . KSII Trans. Internet Inf. Syst., 9 (6): 2111-2131 (2015)