Author of the publication

Indexing Encrypted Documents for Supporting Efficient Keyword Search.

, , , and . Secure Data Management, volume 7482 of Lecture Notes in Computer Science, page 93-110. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudProtect: Managing Data Privacy in Cloud Applications., , , , and . IEEE CLOUD, page 303-310. IEEE, (2012)A Forensic Pattern-Based Approach for Investigations in Cloud System Environments., and . CSNet, page 1-8. IEEE, (2018)CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework., , , , , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 319-327. Springer, (2016)IoT Notary: Sensor Data Attestation in Smart Environment., , , , , , and . NCA, page 1-9. IEEE, (2019)Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications., , , , , and . ARES, page 660-669. IEEE Computer Society, (2015)Indexing Encrypted Documents for Supporting Efficient Keyword Search., , , and . Secure Data Management, volume 7482 of Lecture Notes in Computer Science, page 93-110. Springer, (2012)Toward Architecture Evaluation through Ontology-Based Requirements-Level Scenarios., , , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 225-247. Springer, (2007)IoT Notary: Attestable Sensor Data Capture in IoT Environments., , , , , , and . ACM Trans. Internet Things, 3 (1): 3:1-3:30 (2022)Trustworthy Sensing in an Untrusted IoT Environment., , , and . PerCom Workshops, page 468-471. IEEE Computer Society, (2018)Architectural support for trust models in decentralized applications., , , and . ICSE, page 52-61. ACM, (2006)