Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mehrotra, Sharad
add a person with the name Mehrotra, Sharad
 

Other publications of authors with the same name

Search over Encrypted Data., , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Aggregate Query Processing for Semantic Web Databases: an Algebraic Approach., and . Int. J. Semantic Computing, 1 (4): 479-495 (2007)On Correctness of Nonserializable Executions., , , , and . J. Comput. Syst. Sci., 56 (1): 68-82 (1998)The Gold Text Indexing Engine., , and . ICDE, page 172-179. IEEE Computer Society, (1996)Dynamic Granular Locking Approach to Phantom Protection in R-Trees., and . ICDE, page 446-454. IEEE Computer Society, (1998)Querying Mobile Objects in Spatio-Temporal Databases., , and . SSTD, volume 2121 of Lecture Notes in Computer Science, page 59-78. Springer, (2001)FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination., , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 169-190. Springer, (2010)Privacy protecting data collection in media spaces., , , and . ACM Multimedia, page 48-55. ACM, (2004)Pvault: a client server system providing mobile access to personal data., , and . StorageSS, page 123-129. ACM, (2005)Executing SQL over encrypted data in the database-service-provider model., , , and . SIGMOD Conference, page 216-227. ACM, (2002)