Author of the publication

An efficient algorithm for frequent pattern mining based on privacy-preserving.

, , and . ICNC-FSKD, page 1694-1699. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System., , and . INCoS, page 815-820. IEEE, (2013)Lattice-based ring signature scheme under the random oracle model., , and . IJHPCN, 11 (4): 332-341 (2018)A New Multivariate Hash Function with HAIFA Construction., , , and . TrustCom, page 884-888. IEEE Computer Society, (2011)Lattice-Based Multi-party Concurrent Signatures Scheme., , , , , and . INCoS, page 568-572. IEEE, (2013)ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid., and . AICI (2), volume 6320 of Lecture Notes in Computer Science, page 259-266. Springer, (2010)A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment., , , and . IEEE Access, (2019)An Efficient Identity-Based Signature Scheme for Vehicular Communications., , and . CIS, page 326-330. IEEE Computer Society, (2015)A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures., , and . ISECS, page 362-366. IEEE Computer Society, (2008)Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS., , , and . IEEE Access, (2020)Optimal incentive strategy in blockchain-based mobile crowdsensing using game theory., , , , and . Comput. Networks, (December 2023)