Your selections:
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme
- Sultan, Nazatul H., Kermanshahi, Shabnam K., Tran, Hong Y., Lai, Shangqi, Varadharajan, Vijay, Nepal, Surya, Yi, Xun
Protecting Private Information for Two Classes of Aggregated Database Queries
- Yang, Xuechao, Yi, Xun, Kelarev, Andrei, Rylands, Leanne, Lin, Yuqing, Ryan, Joe
Collusion-resistant protocols for private processing of aggregated queries in distributed databases
- Rylands, Leanne, Seberry, Jennifer, Yi, Xun, Kelarev, Andrei, Ryan, Joe, Lin, Yuqing
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection
- Kelarev, Andrei, Yi, Xun, Badsha, Shahriar, Yang, Xuechao, Rylands, Leanne, Seberry, Jennifer
- Kelarev, Andrei, Ryan, Joe, Rylands, Leanne, Seberry, Jennifer, Yi, Xun
Practical k nearest neighbor queries with location privacy
- Yi, Xun, Paulet, Russell, Bertino, Elisa, Varadharajan, Vijay
Are you sure you would like to clear your session, including search history and login status?