Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization of Spatial Joins on Mobile Devices., , , and . SSTD, volume 2750 of Lecture Notes in Computer Science, page 233-251. Springer, (2003)Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks., , and . Secur. Commun. Networks, (2021)SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol., , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2500-2515 (May 2023)Nearest Neighbor Search with Strong Location Privacy., , and . Proc. VLDB Endow., 3 (1): 619-629 (2010)A General Framework for Searching in Distributed Data Repositories., , , and . IPDPS, page 34. IEEE Computer Society, (2003)Evaluation of Top-k OLAP Queries Using Aggregate R-Trees., , and . SSTD, volume 3633 of Lecture Notes in Computer Science, page 236-253. Springer, (2005)Multilevel Graph-Based Decision Making in Big Scholarly Data: An Approach to Identify Expert Reviewer, Finding Quality Impact Factor, Ranking Journals and Researchers., , , , , , and . IEEE Trans. Emerg. Top. Comput., 9 (1): 280-292 (2021)A scalable architecture for end-to-end QoS provisioning., and . Comput. Commun., 27 (13): 1330-1340 (2004)Privacy-Preserving Location-Aware Mobile Advertisement., and . Trustcom/BigDataSE/ISPA, page 783-790. IEEE, (2016)Design and Implementation of Certificateless Cryptography for IoT Applications., , and . MWSCAS, page 933-937. IEEE, (2023)