Author of the publication

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.

, , , , , and . J. Internet Serv. Inf. Secur., 2 (1/2): 49-58 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing., , , and . Soft Comput., 20 (11): 4487-4495 (2016)Blockchain-Based Accountable Auditing With Multi-Ownership Transfer., , , , and . IEEE Trans. Cloud Comput., 11 (3): 2711-2724 (July 2023)Efficient generic on-line/off-line (threshold) signatures without key exposure., , , , , , , and . Inf. Sci., 178 (21): 4192-4203 (2008)Density-based reliable and robust explainer for counterfactual explanation., , , and . Expert Syst. Appl., (September 2023)Advances in secure and intelligent data processing., , , and . Concurr. Comput. Pract. Exp., 26 (5): 1021-1022 (2014)H∞ State Estimation for Round-Robin Protocol-Based Markovian Jumping Neural Networks with Mixed Time Delays., , , and . Neural Process. Lett., 53 (6): 4313-4330 (2021)Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging., , , , and . IEEE/ACM Trans. Netw., 29 (5): 2242-2253 (2021)Certainty Equivalence Control of Discrete-Time Multiagent Systems: A Framework for Uniform Global Exponential Stability., , , and . IEEE Trans. Autom. Control., 68 (12): 7660-7675 (December 2023)Designing cloud-based electronic health record system with attribute-based encryption., , , , , and . Multim. Tools Appl., 74 (10): 3441-3458 (2015)Deep Generative Knowledge Distillation by Likelihood Finetuning., , , , and . IEEE Access, (2023)