Author of the publication

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification and Control of Nonlinear Systems Using Neural Networks: A Singularity-Free Approach., , , and . IEEE Trans. Neural Netw. Learning Syst., 30 (9): 2696-2706 (2019)Performance analysis of incremental relaying based on partial selection in multi-source multi-relay networks., , , , and . WCSP, page 1-6. IEEE, (2011)High definition video intra-only coding based on node-cell macroblock pixel structure and 2-D interleaved DCT., , and . ICIP, page 1681-1684. IEEE, (2011)Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach., , , and . INFOCOM, page 1454-1462. IEEE, (2008)A two-phase utility maximization framework for wireless medium access control., and . IEEE Trans. Wireless Communications, 6 (12): 4299-4207 (2007)Rate distortion optimized curve determination for curved wavelet image coding., , , and . ICIP, page 2829-2832. IEEE, (2009)Quantization scheme for high definition video coding based on node-cell pixel structure., , and . BMSB, page 1-4. IEEE, (2012)an attack on a multisignature scheme., and . IACR Cryptology ePrint Archive, (2003)SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems., , and . Security and Communication Networks, 9 (16): 3854-3867 (2016)Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing., , , , and . Security and Communication Networks, 9 (16): 3688-3702 (2016)