Author of the publication

A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy landscape of solutions in the binary perceptron problem, , and . CoRR, (2013)Statistical physics of unsupervised learning with prior knowledge in neural networks., and . CoRR, (2019)An Adaptive Heuristic for Scheduling Dynamic and Fuzzy Jobs on Elastic Clouds., , and . CBD, page 7-12. IEEE, (2019)Dynamic Idle Time Interval Scheduling for Hybrid Cloud Workflow Management System., , , , and . SMC, page 3596-3602. IEEE, (2018)Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks., , , , and . IEEE Access, (2020)Improved LDA Dimension Reduction Based Behavior Learning with Commodity WiFi for Cyber-Physical Systems., , , , and . ACM Trans. Cyber Phys. Syst., 3 (4): 38:1-38:19 (2019)RF-IDH: An intelligent fall detection system for hemodialysis patients via COTS RFID., , , and . Future Gener. Comput. Syst., (2020)Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain., , , , and . ISPRS Int. J. Geo Inf., 6 (6): 163 (2017)A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption., , , and . J. Cloud Comput., 13 (1): 44 (December 2024)Improving Path-Coverage for Moving Targets in Wireless Multimedia Sensor Networks., , , and . J. Commun., 9 (11): 843-850 (2014)