Author of the publication

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.

, , , , and . INFOCOM, page 2389-2397. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptual grouping via untangling Gestalt principles., , , , , , and . VCIP, page 1-6. IEEE, (2013)A GPU-Based Method for Weakly Compressible Fluids., , and . CSE, page 121-126. IEEE Computer Society, (2014)A novel particle swarm optimizer with time-delay., , and . Applied Mathematics and Computation, 186 (1): 789-793 (2007)Gait Representation Using Flow Fields., , and . BMVC, page 1-11. British Machine Vision Association, (2009)When Digital Forensic Research Meets Laws., , , , and . ICDCS Workshops, page 542-551. IEEE Computer Society, (2012)Feature selection on Gait Energy Image for human identification., , and . ICASSP, page 985-988. IEEE, (2008)Multi-camera activity correlation analysis., , and . CVPR, page 1988-1995. IEEE Computer Society, (2009)Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN., , , and . Inf. Sci., 181 (22): 5110-5118 (2011)Understanding the Behavior of SFM Algorithms: A Geometric Approach., and . International Journal of Computer Vision, 51 (2): 111-137 (2003)Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks., , and . Sig. Proc.: Image Comm., 29 (9): 1015-1027 (2014)