Author of the publication

Achieving authorized and ranked multi-keyword search over encrypted cloud data.

, , , and . ICC, page 7450-7455. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks., , , and . Computer Networks, 54 (15): 2744-2755 (2010)Computers, productive agency, and the effort after shared meaning., and . J. Computing in Higher Education, 12 (2): 3-33 (2001)HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks., , , , and . Computer Communications, 35 (15): 1910-1920 (2012)EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid., , , , , and . IEEE Trans. Parallel Distrib. Syst., 25 (8): 2053-2064 (2014)PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks., , , , and . Journal of Communications and Networks, 13 (2): 102-112 (2011)PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks., , , , , , and . INFOCOM, page 1395-1403. IEEE, (2012)SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks., , and . INFOCOM, page 632-640. IEEE, (2010)ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications., , , , and . INFOCOM, page 1229-1237. IEEE, (2008)PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks., , , and . VTC Fall, page 1-5. IEEE, (2010)CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks.. GLOBECOM, page 1-6. IEEE, (2009)