Author of the publication

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.

, , , , , and . IEEE Trans. Serv. Comput., 12 (5): 772-785 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3621-3639 (2022)Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing., , , , and . SERVICES, page 19. IEEE, (2021)Attribute-based Encrypted Search for Multi-owner and Multi-user Model., , , , , and . ICC, page 1-7. IEEE, (2021)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (May 2023)Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT., , , , and . IEEE Internet Things J., 11 (2): 3484-3496 (January 2024)CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System., , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (3): 3528-3540 (March 2023)Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS., , , , , , and . IEEE Trans. Serv. Comput., 17 (2): 589-603 (March 2024)Privacy-Preserved Data Trading Via Verifiable Data Disturbance., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3126-3140 (July 2024)VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner., , , , and . Int. J. High Perform. Comput. Netw., 12 (1): 39-48 (2018)