Author of the publication

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.

, , , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 490-502. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BigDataBench: A Dwarf-based Big Data and AI Benchmark Suite., , , , , , , , , and 2 other author(s). CoRR, (2018)SMART: Design and Evaluation of a Collaborative Museum Visiting Application., , , , , , , and . CDVE, volume 9320 of Lecture Notes in Computer Science, page 57-64. Springer, (2015)Filters navigation and positioning based on mining vehicle motion model., , , , , and . CACRE, page 31-36. IEEE, (2020)Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 592-609. Springer, (2013)A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud., , , and . INCoS, page 1-7. IEEE, (2012)Operator splitting based structure-preserving numerical schemes for the mass-conserving convective Allen-Cahn equation., , , and . J. Comput. Phys., (2023)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , and . ACM Trans. Storage, 16 (1): 4:1-4:30 (2020)Efficient Network Path Verification for Policy-routedQueries., , and . CODASPY, page 319-328. ACM, (2016)Spatial Non-Maximum Suppression for Object Detection using Correlation and Dynamic Thresholds., , , , and . ISOCC, page 264-265. IEEE, (2021)A Comprehensive Literature Review on Big Data in Healthcare., , , , , and . AMCIS, Association for Information Systems, (2016)