Author of the publication

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.

, , , , , and . J. Internet Serv. Inf. Secur., 2 (1/2): 49-58 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

STA-Net: spatial-temporal attention network for video salient object detection., , , , and . Appl. Intell., 51 (6): 3450-3459 (2021)A Novel Engine for Various Intrusion Detection Methods., and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 255-265. Springer, (2000)IETF IoT based wireless communication for latency-sensitive use cases in building automation., , , and . ISIE, page 1168-1173. IEEE, (2016)Atomically thin resonant tunnel diodes built from synthetic van der Waals heterostructures, , , , , , , , , and 1 other author(s). Nature communications, (2015)Nanostructural insights into the dissolution behavior of Sr-doped hydroxyapatite, , , , , , and . Journal of the European Ceramic Society, 38 (16): 5554-5562 (2019)Predicting Re-loan Success based on Friendship Network Characteristics in the Online Micro-loan Marketplace., , , , , and . AMCIS, Association for Information Systems, (2018)Research on the Key Application of Computer Biometric Technology in Power Self-Service Terminal., , , , and . CAIBDA, volume 373 of Frontiers in Artificial Intelligence and Applications, page 943-948. IOS Press, (2023)Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network., , , , and . INCoS, page 173-180. IEEE, (2013)CSP-Based General Detection Model of Network Covert Storage Channels., , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 459-468. Springer, (2013)Tumor Boundary Extraction in Multislice MR Brain Images Using Region and Contour Deformation., , , , , and . MIAR, page 183-187. IEEE Computer Society, (2001)