Author of the publication

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.

, , , , , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 24-43. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based Password-Authenticated Key Exchange for Client/Server Model., , and . SECRYPT, page 45-54. SciTePress, (2012)Distributed Association Rule Mining with Minimum Communication Overhead., , and . AusDM, volume 101 of CRPIT, page 17-24. Australian Computer Society, (2009)Practical Remote End-to-End Voting Scheme., and . EGOVIS, volume 6866 of Lecture Notes in Computer Science, page 386-400. Springer, (2011)Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments., , , , and . Inf. Process. Lett., (2022)A new privacy-preserving authentication protocol for anonymous web browsing., , , , , , , and . Concurr. Comput. Pract. Exp., (2019)面向云环境的一致性可验证单关键词检索方法 (Integrity-verifying Single Keyword Search Method in Clouds)., , , , and . 计算机科学, 45 (12): 92-97 (2018)A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity., and . AsiaCCS, page 613-620. ACM, (2019)Privacy of outsourced k-means clustering., , and . AsiaCCS, page 123-134. ACM, (2014)A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security., , and . IEEE Access, (2018)Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things., , , , , and . IEEE Trans. Ind. Informatics, 19 (2): 1535-1547 (2023)