Author of the publication

Authenticated Top-K Aggregation in Distributed and Outsourced Databases.

, , and . SocialCom/PASSAT, page 779-788. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient MD Coding Core Selection to Reduce the Bandwidth Consumption., , and . LCN, page 231-233. IEEE Computer Society, (2007)Traffic storing and related information generation system for cyber attack analysis., , , , and . ICTC, page 1052-1057. IEEE, (2016)Secure mutual proximity zone enclosure evaluation., , and . SIGSPATIAL/GIS, page 133-142. ACM, (2014)Malware detection using malware image and deep learning., , , and . ICTC, page 1193-1195. IEEE, (2017)Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 171-175. Springer, (2015)Authenticated Top-K Aggregation in Distributed and Outsourced Databases., , and . SocialCom/PASSAT, page 779-788. IEEE Computer Society, (2012)A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations., , and . DEXA (1), volume 6261 of Lecture Notes in Computer Science, page 368-384. Springer, (2010)Hierarchical network signature clustering and generation., , , , and . ICTC, page 1191-1193. IEEE, (2016)A forensically robust data acquisition from a 10G line-rate network., , , , and . ICTC, page 1188-1190. IEEE, (2016)Secure sensor network SUM aggregation with detection of malicious nodes., , and . LCN, page 19-27. IEEE Computer Society, (2012)