Author of the publication

SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.

, , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT., and . GLOBECOM, page 1-6. IEEE, (2017)A sybil attack detection scheme for privacy-preserving mobile social networks., and . ICICS, page 1-5. IEEE, (2015)Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)Designing efficient proxy signature schemes for mobile communication., , and . Sci. China Ser. F Inf. Sci., 51 (2): 183-195 (2008)Age-Optimal Network Coding HARQ Transmission Scheme for Dual-Hop Satellite-Integrated Internet., , , , , , and . IEEE Trans. Veh. Technol., 71 (10): 10666-10682 (2022)An enhanced authenticated key agreement protocol for wireless mobile communication., , and . Comput. Stand. Interfaces, 29 (6): 647-652 (2007)Non-interactive deniable authentication protocol based on factoring., and . Comput. Stand. Interfaces, 27 (4): 401-405 (2005)Extended Moving Target Defense for AC State Estimation in Smart Grids., , , , and . IEEE Trans. Smart Grid, 14 (3): 2313-2325 (May 2023)Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment., , , , , , and . IEEE Commun. Mag., 56 (5): 20-21 (2018)Smart community: an internet of things application., , , , , and . IEEE Commun. Mag., 49 (11): 68-75 (2011)