Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning based privacy-preserving fair data trading in big data market., , , , and . Inf. Sci., (2019)LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , , and . IEEE Internet of Things Journal, 6 (3): 4702-4710 (2019)Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies., , , , , , and . IEEE Netw., 33 (5): 111-117 (2019)Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual., , , , , and . AsiaCCS, page 859-871. ACM, (2021)Threshold Ring Signature Scheme from Cryptographic Group Action., , , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 207-227. Springer, (2023)Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy., , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 389-405. Springer, (2016)Decentralized Public Key Infrastructures atop Blockchain., , , , and . IEEE Netw., 34 (6): 133-139 (2020)Quantum-Safe Puncturable Signatures With Their Application in Blockchain., , , and . IEEE Trans. Inf. Forensics Secur., (2024)An efficient linkable group signature for payer tracing in anonymous cryptocurrencies., , , , , and . Future Gener. Comput. Syst., (2019)An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies., , , , and . CoRR, (2019)