159 results on '"Pang, HweeHwa"'
Search Results
2. Securing messaging services through efficient signcryption with designated equality test
3. Secure server-aided top-k monitoring
4. CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
5. Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
6. Text Search Queries
7. Data Streams
8. Introduction
9. Relational Queries
10. Spatial Queries
11. Cryptography Foundation
12. Verifiable Computation on Outsourced Encrypted Data
13. Scalable verification for outsourced dynamic databases
14. Authenticating the query results of text search engines
15. Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes
16. Dual Phase Learning for Large Scale Video Gait Recognition
17. Direct neighbor search
18. Visual Analytics for Supporting Entity Relationship Discovery on Text Data
19. Authenticating Multi-dimensional Query Results in Data Publishing
20. Authenticating Query Results in Data Publishing
21. Detecting anomaly collections using extreme feature ranks
22. Conclusion
23. Verifiable Computation on Outsourced Encrypted Data
24. Efficient processing of exact top-k queries over disk-resident sorted lists
25. STEvent: spatio-temporal event model for social network discovery
26. Partially materialized digest scheme: an efficient verification method for outsourced databases
27. Social Network Discovery by Mining Spatio-Temporal Events
28. Introduction
29. Data Streams
30. Spatial Queries
31. Query Answer Authentication
32. Text Search Queries
33. Cryptography Foundation
34. Steganographic schemes for file system and B-tree
35. Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes
36. Masking page reference patterns in encryption databases on untrusted storage
37. Three architectures for trusted data dissemination in edge computing
38. Visual Analytics for Supporting Entity Relationship Discovery on Text Data
39. Privacy-Preserving Outsourced Calculation Toolkit in the Cloud
40. Authenticating Multi-dimensional Query Results in Data Publishing
41. Authenticating Query Results in Data Publishing
42. Tertiary storage in multimedia systems: staging or direct access?
43. Multiclass query scheduling in real-time database systems
44. Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
45. Load Sharing in Distributed Multimedia-on-Demand Systems
46. Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases
47. Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data
48. Maximum rank query
49. Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data
50. Detecting anomaly collections using extreme feature ranks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.