Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-order-preserving Index for Encrypted Database Management System., , , and . DEXA (2), volume 10439 of Lecture Notes in Computer Science, page 190-198. Springer, (2017)Non-homogeneous generalization in privacy preserving data publishing., , and . SIGMOD Conference, page 747-758. ACM, (2010)Privacy-Preserving Clustering with High Accuracy and Low Time Complexity., , and . DASFAA, volume 5463 of Lecture Notes in Computer Science, page 456-470. Springer, (2009)Security and computability in database applications. University of Hong Kong, (2011)Secure kNN computation on encrypted databases., , , and . SIGMOD Conference, page 139-152. ACM, (2009)Search Planning and Analysis for Mobile Targets with Robots., , and . QSHINE, volume 300 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-21. Springer, (2019)Joint Energy Optimization of Cooling Systems and Virtual Machine Consolidation in Data Centers., , , and . ICCCN, page 1-8. IEEE, (2020)A study of different unwarping methods for omnidirectional imaging., , , and . ICSIPA, page 433-438. IEEE, (2011)Omnidirectional Surveillance System for Digital Home Security., , , and . ICSAP, page 8-12. IEEE Computer Society, (2009)A Modified Chaotic Cryptographic Method., , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)