Author of the publication

Query Authentication over Cloud Data from Multiple Contributors.

, , and . APWeb, volume 8709 of Lecture Notes in Computer Science, page 469-477. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Ability Community for Personalized Knowledge Tracing., , , , , and . APWeb/WAIM (2), volume 12318 of Lecture Notes in Computer Science, page 176-192. Springer, (2020)A New Approach for Date Sharing and Recommendation in Social Web., , , , and . DEXA (2), volume 7447 of Lecture Notes in Computer Science, page 314-328. Springer, (2012)Object Deputy Model and Its Applications., and . DASFAA, volume 5 of Advanced Database Research and Development Series, page 1-15. World Scientific, (1995)Reduction of Update Propagation Overhead for Data Warehousing Incorporating OODBs., and . DASFAA, volume 6 of Advanced Database Research and Development Series, page 195-204. World Scientific, (1997)Tell me the truth: Practically public authentication for outsourced databases with multi-user modification., , , , and . Inf. Sci., (2017)An Object Deputy Model for Realization of Flexible and Powerful Objectbases., and . Journal of Systems Integration, 6 (4): 329-362 (1996)A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications., , , , , and . J. Parallel Distributed Comput., (2017)A Scientific Workflow Framework Integrated with Object Deputy Model for Data Provenance., , , , and . WAIM, volume 4016 of Lecture Notes in Computer Science, page 569-580. Springer, (2006)A co-training based method for chinese patent semantic annotation., , and . CIKM, page 2379-2382. ACM, (2012)A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications., , and . NLPCC, volume 9362 of Lecture Notes in Computer Science, page 229-241. Springer, (2015)