Author of the publication

Multi-User and Keyword-Based Searchable Encryption Scheme.

, , and . CIS, page 223-227. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncovering anomalous rating behaviors for rating systems., , , and . Neurocomputing, (2018)A New Two-Step Gradient-Based Backpropagation Training Method for Neural Networks., and . ISNN (1), volume 6063 of Lecture Notes in Computer Science, page 95-101. Springer, (2010)An efficient algorithm for frequent pattern mining based on privacy-preserving., , and . ICNC-FSKD, page 1694-1699. IEEE, (2017)Reversible Data Hiding in Encrypted Images Based on Image Reprocessing and Polymorphic Compression., , , , and . ICONIP (14), volume 1968 of Communications in Computer and Information Science, page 230-243. Springer, (2023)An Improved ID-based Restrictive Partially Blind Signature Scheme., , , and . SNPD, page 295-300. IEEE Computer Society, (2008)A fine-grained petri model for SQL time-blind injection., , , , and . NaNA, page 161-167. IEEE, (2021)An Improved LRP-Based Differential Privacy Preserving Deep Learning Framework., and . CIS, page 484-488. IEEE, (2021)Multi-User and Keyword-Based Searchable Encryption Scheme., , and . CIS, page 223-227. IEEE Computer Society, (2016)Reversible Data Hiding Based on Adaptive Embedding with Local Complexity., , , , , , and . ICONIP (5), volume 14451 of Lecture Notes in Computer Science, page 522-534. Springer, (2023)Lattice-based ring signature scheme under the random oracle model., , and . IJHPCN, 11 (4): 332-341 (2018)