Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner., , and . Comput. Secur., (2017)Efficiently and securely harnessing cloud to solve linear regression and other matrix operations., , and . Future Gener. Comput. Syst., (2018)Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner., , and . PAKDD (2), volume 9652 of Lecture Notes in Computer Science, page 401-414. Springer, (2016)DCIV: Decentralized cross-chain data integrity verification with blockchain., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 7988-7999 (2022)Shuffle Differential Private Data Aggregation for Random Population., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 34 (5): 1667-1681 (May 2023)Efficient and secure multi-dimensional geometric range query over encrypted data in cloud., , , and . J. Parallel Distributed Comput., (2019)FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2869-2885 (September 2023)Two Simple Attacks on a Blind Signature Scheme., , and . Int. J. Netw. Secur., 16 (6): 498-500 (2014)Privacy Preserving Aggregate Query of OLAP for Accurate Answers., , , and . J. Comput., 5 (11): 1678-1685 (2010)A Block-Level RNN Model for Resume Block Classification., , , , , and . IEEE BigData, page 5855-5857. IEEE, (2020)