Author of the publication

PPsky: Privacy-Preserving Skyline Queries with Secret Sharing in eHealthcare.

, , , and . GLOBECOM, page 5469-5474. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simple three-party key exchange protocol., and . Comput. Secur., 26 (1): 94-97 (2007)On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach., , , , and . ACM Trans. Cyber Phys. Syst., 3 (1): 10:1-10:25 (2019)Duth: a user-friendly dual-factor authentication for Android smartphone devices., , , and . Secur. Commun. Networks, 8 (7): 1213-1222 (2015)Security and Privacy Challenges in Vehicular Cloud Computing., , , , and . Mob. Inf. Syst., (2016)Secure sharing and searching for real-time video data in mobile cloud., , , , , and . IEEE Netw., 29 (2): 46-50 (2015)Grant Free Age-Optimal Random Access Protocol for Satellite-Based Internet of Things., , , , and . IEEE Trans. Commun., 70 (6): 3947-3961 (2022)Age of Information Minimization for Short-Packet Communications RSMA in Satellite-based IoT., , , , , and . VTC Fall, page 1-5. IEEE, (2023)FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System., , , , and . AsiaCCS, page 95-106. ACM, (2016)Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT., and . GLOBECOM, page 1-6. IEEE, (2017)A sybil attack detection scheme for privacy-preserving mobile social networks., and . ICICS, page 1-5. IEEE, (2015)