Author of the publication

Design of Privacy-Preserving Cloud Storage Framework.

, , , and . GCC, page 128-132. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication., , , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 240-250. Springer, (2018)Backdoor Attacks with Wavelet Embedding: Revealing and enhancing the insights of vulnerabilities in visual object detection models on transformers within digital twin systems., and . Adv. Eng. Informatics, (2024)A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks., , , and . ChineseCSCW, volume 1042 of Communications in Computer and Information Science, page 50-64. Springer, (2019)A Verifiable Fully Homomorphic Encryption Scheme., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 412-426. Springer, (2019)KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment., , , and . Intelligent Information Processing, volume 538 of IFIP Advances in Information and Communication Technology, page 311-320. Springer, (2018)An Efficient Identity-based Forward Secure Signature Scheme from Lattices., and . IWCMC, page 626-631. IEEE, (2021)TCP DDOS Attack Detection on the Host in the KVM Virtual Machine Environment., , , and . ACIS-ICIS, page 62-67. IEEE Computer Society, (2012)Design of Privacy-Preserving Cloud Storage Framework., , , and . GCC, page 128-132. IEEE Computer Society, (2010)A Verifiable Encryption Scheme Supporting Fuzzy Search., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 397-411. Springer, (2019)Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing., , and . WISA, volume 12999 of Lecture Notes in Computer Science, page 274-286. Springer, (2021)