Author of the publication

Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings.

, , , , , and . IEEE Trans. Consumer Electron., 69 (4): 890-901 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A risk adaptive access control model based on Markov for big data in the cloud., , , and . IJHPCN, 13 (4): 464-475 (2019)Secret Sharing Scheme with Fairness., , , and . TrustCom, page 494-500. IEEE Computer Society, (2011)A reversible and lossless secret image sharing scheme with authentication for color images., , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101854 (December 2023)Reduction of the semigroup-action problem on a module to the hidden-subgroup problem., , and . Quantum Inf. Process., 23 (8): 300 (August 2024)Ghost-Weight protocol: a highly efficient blockchain consensus for IoT., , , , and . J. Supercomput., 81 (1): 61 (January 2025)Rational Delegation Learning Outsourcing Scheme Based on Game Theory., , , , and . NaNA, page 130-135. IEEE, (2020)Res2-Unet: An Enhanced Network for Generalized Nuclear Segmentation in Pathological Images., , , , and . MMM (2), volume 12573 of Lecture Notes in Computer Science, page 87-98. Springer, (2021)Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing., , , , , and . NaNA, page 429-436. IEEE, (2019)Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow., , , , and . Mob. Networks Appl., 28 (5): 1625-1635 (October 2023)H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network., , , , , and . IEEE Internet Things J., 11 (20): 33758-33772 (October 2024)