From post

Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing.

, , , , и . ProvSec, том 10005 из Lecture Notes in Computer Science, стр. 153-172. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Graph encryption for all-path queries., , , , и . Concurr. Comput. Pract. Exp., (2020)Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets., , , и . IEEE Trans. Cloud Comput., 10 (2): 1201-1214 (2022)Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data., , , и . IEEE Access, (2020)Privacy-preserving image retrieval in a distributed environment., , , и . Int. J. Intell. Syst., 37 (10): 7478-7501 (2022)Faster fog-aided private set intersectionwith integrity preserving., , , и . Frontiers Inf. Technol. Electron. Eng., 19 (12): 1558-1568 (2018)Publicly verifiable function secret sharing., , , и . Int. J. Comput. Sci. Eng., 20 (4): 526-535 (2019)A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation., и . ICoC, том 401 из Communications in Computer and Information Science, стр. 218-235. Springer, (2013)Privacy-Enhancing k-Nearest Neighbors Search over Mobile Social Networks., , , и . Sensors, 21 (12): 3994 (2021)RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing., , , и . Sensors, 22 (11): 4012 (2022)Semi-Supervised Learning Based Fake Review Detection., , , , , , , , и . ISPA/IUCC, стр. 1278-1280. IEEE, (2017)