Author of the publication

Efficient and secure top-k query processing algorithm using garbled circuit based secure protocols on outsourced databases.

, , , and . EDB, page 124-134. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data., , and . BigComp, page 77-82. IEEE Computer Society, (2014)A Privacy-Preserving Top-k Query Processing Algorithm in the Cloud Computing., , and . GECON, volume 10382 of Lecture Notes in Computer Science, page 277-292. Springer, (2016)A secure kNN query processing algorithm using homomorphic encryption on outsourced database., , and . Data Knowl. Eng., (2019)A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing., , , and . IJDWM, 10 (4): 26-49 (2014)A kNN query processing algorithm using a tree index structure on the encrypted database., , and . BigComp, page 93-100. IEEE Computer Society, (2016)Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data., , and . Data Knowl. Eng., (2016)Linear Function Based Transformation Scheme for Preserving Database Privacy in Cloud Computing., , , and . ICPADS, page 498-503. IEEE Computer Society, (2013)A New Grid-Based Cloaking Scheme for Continuous Queries in Centralized LBS Systems., , , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 345-352. Springer, (2013)A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases., , and . Security and Communication Networks, 7 (10): 1498-1509 (2014)Efficient and secure top-k query processing algorithm using garbled circuit based secure protocols on outsourced databases., , , and . EDB, page 124-134. ACM, (2016)