Author of the publication

Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks.

, , , , and . Ad Hoc & Sensor Wireless Networks, 18 (3-4): 311-331 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving OLAP for Accurate Answer., , , and . Journal of Circuits, Systems, and Computers, (2012)Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks., , , , and . Ad Hoc & Sensor Wireless Networks, 18 (3-4): 311-331 (2013)Secure and controllable k-NN query over encrypted cloud data with key confidentiality., , and . J. Parallel Distrib. Comput., (2016)Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments., and . IEICE Transactions, 97-A (1): 409-412 (2014)Secure k-NN computation on encrypted cloud data without sharing key with query users., , and . SCC@ASIACCS, page 55-60. ACM, (2013)A Genetic Algorithm Based Technique for Outlier Detection with Fast Convergence., , , , , , , and . ADMA, volume 11323 of Lecture Notes in Computer Science, page 95-104. Springer, (2018)Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud., , , , and . Concurrency and Computation: Practice and Experience, (2019)VAGA: Towards Accurate and Interpretable Outlier Detection Based on Variational Auto-Encoder and Genetic Algorithm for High-Dimensional Data., , , , , , and . IEEE BigData, page 5956-5958. IEEE, (2021)Cloud-assisted secure biometric identification with sub-linear search efficiency., , , and . Soft Comput., 24 (8): 5885-5896 (2020)Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application., , , , , and . WKDD, page 554-558. IEEE Computer Society, (2009)