Author of the publication

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.

, , , , , , and . Pervasive Mob. Comput., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seeking Based on Dynamic Prices: Higher Earnings and Better Strategies in Ride-on-Demand Services., , , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (5): 5527-5542 (May 2023)Roll reduction and course keeping for the ship moving in waves with factorized NGMV control., , , and . CDC, page 5692-5697. IEEE, (2014)Joint Super-Resolution and Classification Based on Bidirectional Mapping and Multiple Constraints., , , , and . ICME, page 486-491. IEEE, (2023)FCT: a fully-distributed context-aware trust model for location based service recommendation., , , and . Sci. China Inf. Sci., 60 (8): 082102:1-082102:16 (2017)VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings., , , , , , and . Pervasive Mob. Comput., (2017)Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)LSOT: A Lightweight Self-Organized Trust Model in VANETs., , , , and . Mob. Inf. Syst., (2016)Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels., , , , and . IWDW, volume 12617 of Lecture Notes in Computer Science, page 15-30. Springer, (2020)Robust crowdsourced learning., , and . IEEE BigData, page 338-343. IEEE Computer Society, (2013)EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing., , , , , , , and . CoRR, (2022)